Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
5c6306249c28aa2c19e8fb4143a2e205_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c6306249c28aa2c19e8fb4143a2e205_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
9KB
-
MD5
2a299c8586843567d3ee717038a77054
-
SHA1
7cadd3603aecbc855eb4af82e684ebb9fde3b87c
-
SHA256
b8da8eb115836cda9adb1d3c6ccac1044dd3ef995d4a8eb935453696d91556bb
-
SHA512
4874c9d762642a35fb63aa04af3f3b021c1f913f72673fad09e3af66804323f4609597c2651fb6df1336f36aa5146d167f93a8ede68f5a505b0d992fee3ecccb
-
SSDEEP
192:V6JaVGQ+xI5EeuyvMmGpeWH2J5xprN+Ad:V6JaVh4I5rpPr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2152 2672 rundll32.exe 31 PID 2672 wrote to memory of 2152 2672 rundll32.exe 31 PID 2672 wrote to memory of 2152 2672 rundll32.exe 31 PID 2672 wrote to memory of 2152 2672 rundll32.exe 31 PID 2672 wrote to memory of 2152 2672 rundll32.exe 31 PID 2672 wrote to memory of 2152 2672 rundll32.exe 31 PID 2672 wrote to memory of 2152 2672 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#12⤵PID:2152
-