Overview
overview
7Static
static
381c16698aa...18.exe
windows7-x64
781c16698aa...18.exe
windows10-2004-x64
7$PLUGINSDIR/Info.dll
windows7-x64
3$PLUGINSDIR/Info.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_21_.exe
windows7-x64
1$_21_.exe
windows10-2004-x64
1background.js
windows7-x64
3background.js
windows10-2004-x64
3red.html
windows7-x64
1red.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
81c16698aad62bb18d9d4d4342c8a93a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81c16698aad62bb18d9d4d4342c8a93a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Info.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Info.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$_21_.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$_21_.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
background.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
background.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
red.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
red.html
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/Info.dll
-
Size
684KB
-
MD5
3aacd798bbeb527dc546b6d6fdff7fef
-
SHA1
8ef0976dfb3eee1e9fdf7aad81170e195b2eb822
-
SHA256
13e7666c84824d5dea12e65239ed21b16c933764ce8f5fe66c39a7b26488a6dc
-
SHA512
e91a4d5b7bed8797e393c75f6f2d02e05fe39faf286353106082e9bfb0dade592eaec3f322662faff04b343f2490b1cc0b006bc6711a5448c42578732d9ec85f
-
SSDEEP
12288:+xqrGlLpSOg1ZLYssSxwm6/jx7cg4D95l1ALuLYVppSCNtWueY4H4o9:+xq6lLp4wLjNcg4D3ki6ppSCDWuyH4o9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3448 3544 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3544 1604 rundll32.exe 82 PID 1604 wrote to memory of 3544 1604 rundll32.exe 82 PID 1604 wrote to memory of 3544 1604 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Info.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Info.dll,#12⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 6403⤵
- Program crash
PID:3448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3544 -ip 35441⤵PID:2420