Overview
overview
7Static
static
784bb93bc61...18.exe
windows7-x64
784bb93bc61...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...sk.dll
windows7-x64
3$PLUGINSDI...sk.dll
windows10-2004-x64
3Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 04:01
Behavioral task
behavioral1
Sample
84bb93bc6104c090720f593d3302a499_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84bb93bc6104c090720f593d3302a499_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsWebJPDesk.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsWebJPDesk.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/nsWebJPDesk.dll
-
Size
243KB
-
MD5
43fb8d8baf778bbb1ac9e76880b718bd
-
SHA1
55e93b112e89108b5995ef4602f51b99c1f2be69
-
SHA256
ef3b461f4b2ecf036376ccc33baa7f412318a6642fa82132e7e78f5e5f7d5867
-
SHA512
0e3f67fd7a2d1c14e60bcd1ddec10168f382214e73816d2565189982788fee81ab4d9305be866c50d259e5c99e5ba9b46d08888f3c64487465d6e113cc363987
-
SSDEEP
3072:sz28IH4In1NPxwGZ+hkqQkkc6ncSQ9vyw8gekwvegpl4:szuYa1I3kqdKcS0Hwjl4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2404 1316 rundll32.exe 30 PID 1316 wrote to memory of 2404 1316 rundll32.exe 30 PID 1316 wrote to memory of 2404 1316 rundll32.exe 30 PID 1316 wrote to memory of 2404 1316 rundll32.exe 30 PID 1316 wrote to memory of 2404 1316 rundll32.exe 30 PID 1316 wrote to memory of 2404 1316 rundll32.exe 30 PID 1316 wrote to memory of 2404 1316 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsWebJPDesk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsWebJPDesk.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2404
-