Overview
overview
7Static
static
736f1e07ff3...18.exe
windows7-x64
736f1e07ff3...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3MediaInfo.dll
windows7-x64
7MediaInfo.dll
windows10-2004-x64
7Uninst.exe
windows7-x64
7Uninst.exe
windows10-2004-x64
7dp_fastvid...rt.exe
windows7-x64
7dp_fastvid...rt.exe
windows10-2004-x64
7mencoder.exe
windows7-x64
7mencoder.exe
windows10-2004-x64
7pthreadGC2.dll
windows7-x64
1pthreadGC2.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 00:06
Behavioral task
behavioral1
Sample
36f1e07ff32336cb803034645dd643b2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36f1e07ff32336cb803034645dd643b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
MediaInfo.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
MediaInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Uninst.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
dp_fastvideoconvert.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
dp_fastvideoconvert.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
mencoder.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
mencoder.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
pthreadGC2.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
pthreadGC2.dll
Resource
win10v2004-20240709-en
General
-
Target
pthreadGC2.dll
-
Size
35KB
-
MD5
2aaafd23e9a77dd8fc3d73a45cfeac01
-
SHA1
f41ebb61094231af29dc378c1a2c8620102eb58c
-
SHA256
cd4104379b2aac36b2465623540e30052b2b44f90229709e7d0c65c98394fc05
-
SHA512
ccd398eaf34c3b2b402e7cbd447fcb0819077ed7ed6c2e874fa72ffead14facef830b864014e3d5b399a8b52561dd0000251177fdb6e027451043a265ab731f3
-
SSDEEP
384:6XKAwDe/yMw0U0GuOI+KDYZ1EWsLKkSqPmMmg2oes9yzCuFYh3oDqLjBISO0IqMU:6XKAm0UsO76WsxDmELsCDIMiH3YN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2300 1736 rundll32.exe 83 PID 1736 wrote to memory of 2300 1736 rundll32.exe 83 PID 1736 wrote to memory of 2300 1736 rundll32.exe 83