Overview
overview
7Static
static
33093678f31...18.exe
windows7-x64
73093678f31...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3ShowImage.exe
windows7-x64
1ShowImage.exe
windows10-2004-x64
1SmileScreenShot.exe
windows7-x64
1SmileScreenShot.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
3093678f3170aca9b98e852570e6fa54_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3093678f3170aca9b98e852570e6fa54_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
ShowImage.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
ShowImage.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
SmileScreenShot.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
SmileScreenShot.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
7KB
-
MD5
a3f1e5d94d8e07121bad59af16ef358a
-
SHA1
9223fa516807ec103e5381ce8b2b7295a846a89f
-
SHA256
bedcdb63f027107c471fe244554c3038fb4caf9f96f7eab2d430f76f2f4f768b
-
SHA512
6b466ff8dd9855048dcdd3b21760bd0cce77b1aed561d8cf2099089b97910f8d2da86970a2023c59e1807a45138cc25fcb899f9df67845bdf22a44ec7b491050
-
SSDEEP
96:riqPXbjaKyFU40KhveE+6nrh9MXEiGDdoDxUxOLqtJ1taRhElfRx2:riqPXaKy1k4h9kvDxUxj/tWgfRx2
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3064 892 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4056 wrote to memory of 892 4056 rundll32.exe 83 PID 4056 wrote to memory of 892 4056 rundll32.exe 83 PID 4056 wrote to memory of 892 4056 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#12⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 6123⤵
- Program crash
PID:3064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 892 -ip 8921⤵PID:1904