Overview
overview
7Static
static
33f6588b64f...18.exe
windows7-x64
73f6588b64f...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Acrobat2Dict.dll
windows7-x64
1Acrobat2Dict.dll
windows10-2004-x64
1CrashRpt.dll
windows7-x64
1CrashRpt.dll
windows10-2004-x64
1Monitor.exe
windows7-x64
1Monitor.exe
windows10-2004-x64
1RunDict.exe
windows7-x64
4RunDict.exe
windows10-2004-x64
7TextExtrac...32.dll
windows7-x64
1TextExtrac...32.dll
windows10-2004-x64
1TextExtrac...64.dll
windows7-x64
1TextExtrac...64.dll
windows10-2004-x64
1WordBook.exe
windows7-x64
1WordBook.exe
windows10-2004-x64
1WordStroke...32.dll
windows7-x64
1WordStroke...32.dll
windows10-2004-x64
1WordStroke...64.dll
windows7-x64
1WordStroke...64.dll
windows10-2004-x64
1XDLL.dll
windows7-x64
3XDLL.dll
windows10-2004-x64
3background.html
windows7-x64
1background.html
windows10-2004-x64
1lookup.js
windows7-x64
3lookup.js
windows10-2004-x64
3YodaoDict.dll
windows7-x64
3YodaoDict.dll
windows10-2004-x64
3Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
3f6588b64f50d3372cef390ff6471ec1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f6588b64f50d3372cef390ff6471ec1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Acrobat2Dict.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Acrobat2Dict.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
CrashRpt.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
CrashRpt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Monitor.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Monitor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
RunDict.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
RunDict.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
TextExtractorImpl32.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
TextExtractorImpl32.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
TextExtractorImpl64.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
TextExtractorImpl64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
WordBook.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
WordBook.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
WordStrokeHelper32.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
WordStrokeHelper32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
WordStrokeHelper64.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
WordStrokeHelper64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
XDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
XDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
background.html
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
background.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
lookup.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
lookup.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
YodaoDict.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
YodaoDict.dll
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
33KB
-
MD5
c6e1bd79c42fae30f95db66d168ca034
-
SHA1
7cdd4a01b55b5e99b3f007e67c0f403e996af456
-
SHA256
4f13328bf6a006897b0ea5481a27fc96bc1edcf7eeb9816023f583471af2d5bb
-
SHA512
3b3214907be4c54362d615cdbe1dd7993fe825c8ae8cca76c8e27549bb3155a9c4970c2cf2711a97bf280f1958cf1aa41864226e2a68d32e6343c3704a9856f1
-
SSDEEP
384:pbme/+uycTFC1zedCa2pbzDgp4CZkGTTh26rK+KtbQyhPE:piuycT01zedCa6bwp4nLZ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1760 1728 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 2564 wrote to memory of 1728 2564 rundll32.exe 29 PID 1728 wrote to memory of 1760 1728 rundll32.exe 30 PID 1728 wrote to memory of 1760 1728 rundll32.exe 30 PID 1728 wrote to memory of 1760 1728 rundll32.exe 30 PID 1728 wrote to memory of 1760 1728 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 2483⤵
- Program crash
PID:1760
-
-