Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
2b148b9a567813faca2e6a4fcef50b7f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b148b9a567813faca2e6a4fcef50b7f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/qlbxjrk.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/qlbxjrk.dll
Resource
win10v2004-20240426-en
General
-
Target
$PLUGINSDIR/qlbxjrk.dll
-
Size
166KB
-
MD5
68705fcc947dd8e44856c37fee389c71
-
SHA1
18074eb0e2251f76201fd1f1b0f53b30939999dc
-
SHA256
e87e8f655ea2bca3ee19a827fb9be7eb3ca566bf1b343d5739ee701d48067a2e
-
SHA512
677793583d73311517ced5ec1678574296747361d4e6bb3699b5d4a8a00785c36b58c76dae52965dad6a39a9cdc8f90182f765de55603e4e712391df62a184bf
-
SSDEEP
3072:GPpFSGguquO8/q/7NdGikFdt6l+tq9sjY8ae3p9X:WpFSsCzNYdt6LJwp9X
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 2052 2940 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2820 wrote to memory of 2940 2820 rundll32.exe 28 PID 2940 wrote to memory of 2052 2940 rundll32.exe 29 PID 2940 wrote to memory of 2052 2940 rundll32.exe 29 PID 2940 wrote to memory of 2052 2940 rundll32.exe 29 PID 2940 wrote to memory of 2052 2940 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\qlbxjrk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\qlbxjrk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 2243⤵
- Program crash
PID:2052
-
-