Overview
overview
3Static
static
38c7661068d...18.exe
windows7-x64
38c7661068d...18.exe
windows10-2004-x64
3DefaultSettings.exe
windows7-x64
1DefaultSettings.exe
windows10-2004-x64
3Zoom Playe...er.exe
windows7-x64
3Zoom Playe...er.exe
windows10-2004-x64
3zpiconlib.dll
windows7-x64
3zpiconlib.dll
windows10-2004-x64
3zplayer.exe
windows7-x64
3zplayer.exe
windows10-2004-x64
3zpresampler.dll
windows7-x64
3zpresampler.dll
windows10-2004-x64
3zpupdate.exe
windows7-x64
3zpupdate.exe
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
8c7661068d42efcdabff0ccdae38b0df_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c7661068d42efcdabff0ccdae38b0df_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DefaultSettings.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
DefaultSettings.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Zoom Player Install Center.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Zoom Player Install Center.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
zpiconlib.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
zpiconlib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
zplayer.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
zplayer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
zpresampler.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
zpresampler.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
zpupdate.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
zpupdate.exe
Resource
win10v2004-20240802-en
General
-
Target
zpresampler.dll
-
Size
19KB
-
MD5
9451bc212d134d849686c1637ac9d13c
-
SHA1
e3576ac78f7c8d6d24a4f1611acfea403ba1ff20
-
SHA256
29bc71ec38d424a4ceca33b37dcba3da505468a1adf9178b6dfd97ed34c43d98
-
SHA512
765209196eefd50895701d9a4fce0be246d3907f454bd4e085a9e6e6043ad1474d4e797a9d942a29784acaa36d2803987427feb648127b3da3c73a2b7720fa9b
-
SSDEEP
384:PTueO36c51CHcoDy6P1UluLLwc5V1S2Y3uyIv4wUe7ixTT3evn/q:PTFG2bDy6NUlBc/1S2oZ7e7iRT3e/
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2240 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 1824 wrote to memory of 2240 1824 rundll32.exe 30 PID 2240 wrote to memory of 2744 2240 rundll32.exe 31 PID 2240 wrote to memory of 2744 2240 rundll32.exe 31 PID 2240 wrote to memory of 2744 2240 rundll32.exe 31 PID 2240 wrote to memory of 2744 2240 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zpresampler.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zpresampler.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2243⤵
- Program crash
PID:2744
-
-