Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
32cce6545af187d0efe96c7e40c71c8d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
32cce6545af187d0efe96c7e40c71c8d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallUtility.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallUtility.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/InstallUtility.dll
-
Size
1.0MB
-
MD5
6112257babfd780d815e8448d9d30395
-
SHA1
32ac068f0a885410baddaad5782be6bdd242182a
-
SHA256
83059ba16b860d154ee27361e9b9b6ea090aeaf1f48f3c5b1303c750d7ae05ae
-
SHA512
3f570338d3a18334711b9bfb47994e24042d2c732e8c71221ff06c3482c656e805d2ebb96047b7120cd14885b409fa24ddce68d9dcbfcc57775561e64d596b8b
-
SSDEEP
24576:Sqxnjdf7XNK7gCCRssiYABp7p7TZ9ThYyZJPek:J5VN5asiL1TPThrZJPek
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\BavSvc rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 360 wrote to memory of 2192 360 rundll32.exe 28 PID 360 wrote to memory of 2192 360 rundll32.exe 28 PID 360 wrote to memory of 2192 360 rundll32.exe 28 PID 360 wrote to memory of 2192 360 rundll32.exe 28 PID 360 wrote to memory of 2192 360 rundll32.exe 28 PID 360 wrote to memory of 2192 360 rundll32.exe 28 PID 360 wrote to memory of 2192 360 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallUtility.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallUtility.dll,#12⤵
- Checks for any installed AV software in registry
PID:2192
-