Overview
overview
7Static
static
7838f069018...18.exe
windows7-x64
7838f069018...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3help.chm
windows7-x64
1help.chm
windows10-2004-x64
1hurrun.exe
windows7-x64
7hurrun.exe
windows10-2004-x64
7import.dll
windows7-x64
7import.dll
windows10-2004-x64
7mousehook.dll
windows7-x64
7mousehook.dll
windows10-2004-x64
7uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 21:07
Behavioral task
behavioral1
Sample
838f0690186d88326e6b46e0728c085b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
838f0690186d88326e6b46e0728c085b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
help.chm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
help.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
hurrun.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
hurrun.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
import.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
import.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
mousehook.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
mousehook.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
import.dll
-
Size
162KB
-
MD5
93a0ada475d95ba06539b84b646439c7
-
SHA1
b173ac84bb754b92df2a50b6c00731072bb201d1
-
SHA256
52628639e73c6d88451ffef1c124cda208704599636c381868ddf5388d669b78
-
SHA512
42c20896b30633c65ef5341e8a1367f512d5f8c278597fbb761bf481cd75218b56a30a6207d2b24212f720e7afe9027a6f4b475f7d8e1187e5df281ff0b67593
-
SSDEEP
3072:z5xUk+w9Ms8LbB3vcQqXsVAzJHm174+G0qEXUZmX+jWZ/VwXqi62:FxN+9xLbBfecqgh/3XUolZ/V
Malware Config
Signatures
-
resource yara_rule behavioral10/memory/5004-0-0x0000000000400000-0x000000000046D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3868 wrote to memory of 5004 3868 rundll32.exe 84 PID 3868 wrote to memory of 5004 3868 rundll32.exe 84 PID 3868 wrote to memory of 5004 3868 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\import.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\import.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5004
-