Overview
overview
10Static
static
3a14104c1a5...18.exe
windows7-x64
10a14104c1a5...18.exe
windows10-2004-x64
7$1/$OUTDIR...er.exe
windows7-x64
7$1/$OUTDIR...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
32611067143.html
windows7-x64
12611067143.html
windows10-2004-x64
1contact-do...g.html
windows7-x64
1contact-do...g.html
windows10-2004-x64
1home.js
windows7-x64
3home.js
windows10-2004-x64
3home1099482986.html
windows7-x64
1home1099482986.html
windows10-2004-x64
1home1259317828.html
windows7-x64
1home1259317828.html
windows10-2004-x64
1index1449123078.html
windows7-x64
1index1449123078.html
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
a14104c1a5e9bcb233b7289b0db68bc8_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a14104c1a5e9bcb233b7289b0db68bc8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
2611067143.html
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
2611067143.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
contact-domains-org.html
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
contact-domains-org.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
home.js
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
home.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
home1099482986.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
home1099482986.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
home1259317828.html
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
home1259317828.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
index1449123078.html
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
index1449123078.html
Resource
win10v2004-20240611-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
15KB
-
MD5
f8d9d9418e6e1827ed2b53dd930e48fb
-
SHA1
c78b0e5b274dbbfd032a0f3ed795d82d5ea617c8
-
SHA256
2a2878b54550178144665d4c5f67309f71f1089679ae0f84fa419b8a309a88e4
-
SHA512
510ac31f9e330ec2e6133c1cbe775a955b79b94dc5a84d94b2c59d9b513c35f3786ff8a7f706d04ec2503a4ffc16535624a34e0dcc53e91eedd2321691b617fc
-
SSDEEP
192:eMGGr8JZYGO9QQr5aQbf1QuQVOmDsjcdOISYKoTs11929WtshLAzuy:eMGu8Jy1ai5aZBptdYYKCs/Yos
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2124 1752 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1688 wrote to memory of 1752 1688 rundll32.exe 28 PID 1752 wrote to memory of 2124 1752 rundll32.exe 29 PID 1752 wrote to memory of 2124 1752 rundll32.exe 29 PID 1752 wrote to memory of 2124 1752 rundll32.exe 29 PID 1752 wrote to memory of 2124 1752 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2443⤵
- Program crash
PID:2124
-
-