Overview
overview
9Static
static
9399d264c0a...18.exe
windows7-x64
7399d264c0a...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DuiLib.dll
windows7-x64
3DuiLib.dll
windows10-2004-x64
3DuiLib_u.dll
windows7-x64
3DuiLib_u.dll
windows10-2004-x64
3MeMeLiveShow.exe
windows7-x64
1MeMeLiveShow.exe
windows10-2004-x64
1UninstallMeMeLive.exe
windows7-x64
7UninstallMeMeLive.exe
windows10-2004-x64
7installstat.exe
windows7-x64
1installstat.exe
windows10-2004-x64
1plugins/NP...09.dll
windows7-x64
1plugins/NP...09.dll
windows10-2004-x64
1update.exe
windows7-x64
1update.exe
windows10-2004-x64
1wke.dll
windows7-x64
1wke.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 10:21
Behavioral task
behavioral1
Sample
399d264c0aa7a682451fb3f6cc3cd38a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
399d264c0aa7a682451fb3f6cc3cd38a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DuiLib.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
DuiLib.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
DuiLib_u.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
DuiLib_u.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
MeMeLiveShow.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
MeMeLiveShow.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
UninstallMeMeLive.exe
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
UninstallMeMeLive.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
installstat.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
installstat.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
plugins/NPSWF32_18_0_0_209.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
plugins/NPSWF32_18_0_0_209.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
update.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
update.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
wke.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
wke.dll
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
375e8a08471dc6f85f3828488b1147b3
-
SHA1
1941484ac710fc301a7d31d6f1345e32a21546af
-
SHA256
4c86b238e64ecfaabe322a70fd78db229a663ccc209920f3385596a6e3205f78
-
SHA512
5ba29db13723ddf27b265a4548606274b850d076ae1f050c64044f8ccd020585ad766c85c3e20003a22f356875f76fb3679c89547b0962580d8e5a42b082b9a8
-
SSDEEP
192:MPtkumJX7zB22kGwfy0mtVgkCPOs91un:9702k5qpds9Qn
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3064 400 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 3004 wrote to memory of 400 3004 rundll32.exe rundll32.exe PID 400 wrote to memory of 3064 400 rundll32.exe WerFault.exe PID 400 wrote to memory of 3064 400 rundll32.exe WerFault.exe PID 400 wrote to memory of 3064 400 rundll32.exe WerFault.exe PID 400 wrote to memory of 3064 400 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 2243⤵
- Program crash
PID:3064
-
-