Overview
overview
10Static
static
31e039f9770...18.exe
windows7-x64
101e039f9770...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Nwiz.dll
windows7-x64
1Nwiz.dll
windows10-2004-x64
3default_hash.js
ubuntu-18.04-amd64
1default_hash.js
debian-9-armhf
1default_hash.js
debian-9-mips
default_hash.js
debian-9-mipsel
libimalloc.dll
windows7-x64
1libimalloc.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
1e039f9770017f09225e58d7759b700a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1e039f9770017f09225e58d7759b700a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Nwiz.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Nwiz.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
default_hash.js
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral8
Sample
default_hash.js
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
default_hash.js
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral10
Sample
default_hash.js
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral11
Sample
libimalloc.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
libimalloc.dll
Resource
win10v2004-20240419-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
883eff06ac96966270731e4e22817e11
-
SHA1
523c87c98236cbc04430e87ec19b977595092ac8
-
SHA256
44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
-
SHA512
60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
SSDEEP
96:UPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+l:UPtkuWJX7zB3kGwfy0nyUVsxCjOMb1u
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1616 3048 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3048 2888 rundll32.exe rundll32.exe PID 3048 wrote to memory of 1616 3048 rundll32.exe WerFault.exe PID 3048 wrote to memory of 1616 3048 rundll32.exe WerFault.exe PID 3048 wrote to memory of 1616 3048 rundll32.exe WerFault.exe PID 3048 wrote to memory of 1616 3048 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 2243⤵
- Program crash