Overview
overview
7Static
static
342af8a31ea...18.exe
windows7-x64
742af8a31ea...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3QtCore4.dll
windows7-x64
3QtCore4.dll
windows10-2004-x64
3QtNetwork4.dll
windows7-x64
3QtNetwork4.dll
windows10-2004-x64
3UninstallMini.exe
windows7-x64
1UninstallMini.exe
windows10-2004-x64
1ayprivoxy.exe
windows7-x64
1ayprivoxy.exe
windows10-2004-x64
1aysocks5.exe
windows7-x64
1aysocks5.exe
windows10-2004-x64
1jiasuqi.exe
windows7-x64
1jiasuqi.exe
windows10-2004-x64
1jiasuqiEx.exe
windows7-x64
1jiasuqiEx.exe
windows10-2004-x64
1jsqService.exe
windows7-x64
1jsqService.exe
windows10-2004-x64
3mgwz.dll
windows7-x64
3mgwz.dll
windows10-2004-x64
3msvcp100.dll
windows7-x64
3msvcp100.dll
windows10-2004-x64
3msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
42af8a31ea73e1f7322b1a86f58c7f18_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
42af8a31ea73e1f7322b1a86f58c7f18_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
QtCore4.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
QtCore4.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
QtNetwork4.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
QtNetwork4.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
UninstallMini.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
UninstallMini.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
ayprivoxy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
ayprivoxy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
aysocks5.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
aysocks5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
jiasuqi.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
jiasuqi.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
jiasuqiEx.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
jiasuqiEx.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
jsqService.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
jsqService.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
mgwz.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
mgwz.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
msvcp100.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
msvcp100.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
msvcr100.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
msvcr100.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
00a0194c20ee912257df53bfe258ee4a
-
SHA1
d7b4e319bc5119024690dc8230b9cc919b1b86b2
-
SHA256
dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
-
SHA512
3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
SSDEEP
192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3192 1552 WerFault.exe 80 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4612 wrote to memory of 1552 4612 rundll32.exe 80 PID 4612 wrote to memory of 1552 4612 rundll32.exe 80 PID 4612 wrote to memory of 1552 4612 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 6123⤵
- Program crash
PID:3192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1552 -ip 15521⤵PID:4932