Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
864c6461a405628b69fb52e1cad9d845_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/olldmhffoaz.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/olldmhffoaz.dll
Resource
win10v2004-20231215-en
General
-
Target
$PLUGINSDIR/olldmhffoaz.dll
-
Size
22KB
-
MD5
374e00e1b931d7e06c74d4ce9c9476a3
-
SHA1
5f199903f9b64b10e218b4d98621f7c2b02b11d9
-
SHA256
80f175c88444e4c1388bdc3560f9c44b9fb3a24861f20bbedab4b5dfd69d10ef
-
SHA512
470793bc592c7ec78cc1dec91ebe48d6136c60d179512782b8b41532d372a8293c53913653931b3c74d1544fb038e1fc649cac745bd65310c1ffc88606350ad4
-
SSDEEP
384:4nMclcY5oSkzLuF1L0hF2IQwAtTbGB1jMbo:4Mc+YSSkzLuFZkw9w+fGBZO
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2320 set thread context of 1920 2320 rundll32.exe 29 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1920 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2912 wrote to memory of 2320 2912 rundll32.exe 28 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29 PID 2320 wrote to memory of 1920 2320 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\olldmhffoaz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\olldmhffoaz.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\olldmhffoaz.dll,#13⤵
- Suspicious use of SetWindowsHookEx
PID:1920
-
-