Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
98ffc3c812e6cec919ebd286973e2002_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98ffc3c812e6cec919ebd286973e2002_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nawgsdqut.dll
Resource
win7-20240319-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nawgsdqut.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/nawgsdqut.dll
-
Size
104KB
-
MD5
d4233fefc9328cc30b0ef014beb2f51b
-
SHA1
302180a5edb1fd653d7884bb60172e6edfbbeac4
-
SHA256
1827a3002964434b0acff1359241948e334148d3413312cfea326cae8f269758
-
SHA512
b3e19c83e631b6a8b8b0d00ab14af811519765b737f1497f27e8c3a8c3328038967dbb6095671e4095af48d6355b5f13cec20c38ef2dfb14cc2ae8e9482de4af
-
SSDEEP
1536:XlGfGAPqPOicsu0WpmS89PdDeSGTzIfTw83qVlIHyaaEil3Wkly9ncobUfs+ulZ6:1GfGAIOqXSKS13nKixlyrquv
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4164 2400 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4084 wrote to memory of 2400 4084 rundll32.exe rundll32.exe PID 4084 wrote to memory of 2400 4084 rundll32.exe rundll32.exe PID 4084 wrote to memory of 2400 4084 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nawgsdqut.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nawgsdqut.dll,#12⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 6323⤵
- Program crash
PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2400 -ip 24001⤵PID:2556