Overview
overview
7Static
static
370ee3ae684...18.exe
windows7-x64
770ee3ae684...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/$R0/$_2_.dll
windows7-x64
3$SYSDIR/$R0/$_2_.dll
windows10-2004-x64
3$SYSDIR/$S...2_.dll
windows7-x64
6$SYSDIR/$S...2_.dll
windows10-2004-x64
6$SYSDIR/$S...2_.exe
windows7-x64
7$SYSDIR/$S...2_.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
70ee3ae684fffd7e17e4f36519da8586_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70ee3ae684fffd7e17e4f36519da8586_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$SYSDIR/$R0/$_2_.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$SYSDIR/$R0/$_2_.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$SYSDIR/$SYSDIR/$_2_.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$SYSDIR/$SYSDIR/$_2_.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$SYSDIR/$SYSDIR/u_$_2_.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$SYSDIR/$SYSDIR/u_$_2_.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
General
-
Target
$SYSDIR/$R0/$_2_.dll
-
Size
283KB
-
MD5
cf06362a765285cb6485b83b19c3fd1d
-
SHA1
b8b5894c792bd21ed8976cc8f9356f1c69af300d
-
SHA256
705a6aec719ae751189baf583711c8d40ec6c0f14d685f2f223fe6675afcd344
-
SHA512
8dec18cd53c967e63ec28f26efb1a6f3964ad3ed757d3a60c05ac8a8ddf21e44d867c67b9a52b46fc2d3dd23b04ae284fad4c0fea934e54eb7583e8b2ac0040b
-
SSDEEP
3072:2nZuxl0nmlMme8kXgv6S2mSaonI02jMNahqHQ9JLx9SlkAdJzOtNSgnyJgVCaikO:ql/uFon2LcHQ9dxyGDA9N1Yx2Bja
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 4124 412 rundll32.exe 83 PID 412 wrote to memory of 4124 412 rundll32.exe 83 PID 412 wrote to memory of 4124 412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$SYSDIR\$R0\$_2_.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$SYSDIR\$R0\$_2_.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4124
-