Overview
overview
10Static
static
3b8af782f98...18.exe
windows7-x64
10b8af782f98...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Perl.dll
windows7-x64
1Perl.dll
windows10-2004-x64
3Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Perl.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Perl.dll
Resource
win10v2004-20240508-en
General
-
Target
Perl.dll
-
Size
102KB
-
MD5
7c433e47ecfd8e776a8551eaa3566331
-
SHA1
03061c1f3844edeb6e0f3d86fa5b3cefdbf81357
-
SHA256
3696f8856be929b28f8db7902369251019168ef9d05c74e617f48a8f9d04ad01
-
SHA512
33162aa80cc4ce511e2fe61ca4059067b264619d825afa66b791e3e0cacd7197e35ebfd1b257ba8d05e30209ce36822e1935eff6664e1c8a96e45ce7f3fbff7d
-
SSDEEP
1536:MWeIFa9HStc5vzMQ8cCHFnfimx/F7I+eVdJp03lGIy6La4zSbEv1N9IvF1x7y819:mIaidkn65NSS4vF1x7yEFkB
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4252 4664 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4664 3948 rundll32.exe 83 PID 3948 wrote to memory of 4664 3948 rundll32.exe 83 PID 3948 wrote to memory of 4664 3948 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Perl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Perl.dll,#12⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 5683⤵
- Program crash
PID:4252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4664 -ip 46641⤵PID:2676