Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
a2695767d5a2ddb172aed22127515650_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2695767d5a2ddb172aed22127515650_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/vioij.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/vioij.dll
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/vioij.dll
-
Size
125KB
-
MD5
d881eaa44c1ea41c7c01dc9fece62729
-
SHA1
a6738529f3a0411aa9632cbfb85f1c00089e962a
-
SHA256
106db993d66af7aefc0aea59b9023fc10a1305c9bd46ea1bd1b4f6a2c9bf50be
-
SHA512
e9958493b2452ad63d7374d169f43805cd1d5b2d222c9d719d73d6b21081d42e3103db908e602837fcc2bc3bebecc3106ab3b13df080e1863ba808192695b300
-
SSDEEP
3072:kclQ3DXue5DAxP0gYi9babpPjBWDJapmE:Z+juea0/iNabxEDJapmE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1460 1784 rundll32.exe 82 PID 1784 wrote to memory of 1460 1784 rundll32.exe 82 PID 1784 wrote to memory of 1460 1784 rundll32.exe 82