Overview
overview
7Static
static
361edc88704...18.exe
windows7-x64
361edc88704...18.exe
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PROGRAM_F...ll.exe
windows7-x64
7$PROGRAM_F...ll.exe
windows10-2004-x64
7decsysswn.exe
windows7-x64
1decsysswn.exe
windows10-2004-x64
1imex.bat
windows7-x64
7imex.bat
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
61edc887048762bc065766ecc60a7586_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61edc887048762bc065766ecc60a7586_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/$0/Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/$0/Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
decsysswn.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
decsysswn.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
imex.bat
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
imex.bat
Resource
win10v2004-20240709-en
General
-
Target
imex.bat
-
Size
97B
-
MD5
ea64e4ae470652eb41085b1bdb26e550
-
SHA1
e2ebe78afd4aaca996b2fd11777b265a920949ca
-
SHA256
4a08df9463aea9301d86a46eada70f07f3eb559510a02c7d00a4006bea5ee675
-
SHA512
90677b5893ae81b271cda2af3a486664f13cad01d71055ec0986cb35449e0f6a0c27c6d0edc201256da506d556a4e9d7a8441190ad853ec1446181fabf569882
Malware Config
Signatures
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 3792 ipconfig.exe 4980 ipconfig.exe 460 ipconfig.exe 4508 ipconfig.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 532 wrote to memory of 4380 532 cmd.exe 87 PID 532 wrote to memory of 4380 532 cmd.exe 87 PID 532 wrote to memory of 4380 532 cmd.exe 87 PID 4380 wrote to memory of 3424 4380 decsysswn.exe 88 PID 4380 wrote to memory of 3424 4380 decsysswn.exe 88 PID 4380 wrote to memory of 3424 4380 decsysswn.exe 88 PID 3424 wrote to memory of 3792 3424 cmd.exe 90 PID 3424 wrote to memory of 3792 3424 cmd.exe 90 PID 3424 wrote to memory of 3792 3424 cmd.exe 90 PID 4380 wrote to memory of 3344 4380 decsysswn.exe 100 PID 4380 wrote to memory of 3344 4380 decsysswn.exe 100 PID 4380 wrote to memory of 3344 4380 decsysswn.exe 100 PID 3344 wrote to memory of 4980 3344 cmd.exe 102 PID 3344 wrote to memory of 4980 3344 cmd.exe 102 PID 3344 wrote to memory of 4980 3344 cmd.exe 102 PID 4380 wrote to memory of 1520 4380 decsysswn.exe 114 PID 4380 wrote to memory of 1520 4380 decsysswn.exe 114 PID 4380 wrote to memory of 1520 4380 decsysswn.exe 114 PID 1520 wrote to memory of 460 1520 cmd.exe 116 PID 1520 wrote to memory of 460 1520 cmd.exe 116 PID 1520 wrote to memory of 460 1520 cmd.exe 116 PID 4380 wrote to memory of 4624 4380 decsysswn.exe 120 PID 4380 wrote to memory of 4624 4380 decsysswn.exe 120 PID 4380 wrote to memory of 4624 4380 decsysswn.exe 120 PID 4624 wrote to memory of 4508 4624 cmd.exe 122 PID 4624 wrote to memory of 4508 4624 cmd.exe 122 PID 4624 wrote to memory of 4508 4624 cmd.exe 122
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\imex.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\decsysswn.exeC:\Users\Admin\AppData\Local\Temp\decsysswn.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:4980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:4508
-
-
-