Overview
overview
7Static
static
38aaf4eba60...18.exe
windows7-x64
78aaf4eba60...18.exe
windows10-2004-x64
7$0.dll
windows7-x64
3$0.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PROGRAMFI...to.chm
windows7-x64
1$PROGRAMFI...to.chm
windows10-2004-x64
1$TEMP/4673...up.dll
windows7-x64
3$TEMP/4673...up.dll
windows10-2004-x64
3$TEMP/4673...le.exe
windows7-x64
1$TEMP/4673...le.exe
windows10-2004-x64
3$TEMP/Move...on.dll
windows7-x64
3$TEMP/Move...on.dll
windows10-2004-x64
3InstDrvAction-32.exe
windows7-x64
3InstDrvAction-32.exe
windows10-2004-x64
3UnloadModule.exe
windows7-x64
1UnloadModule.exe
windows10-2004-x64
3ePassNgMgr.exe
windows7-x64
3ePassNgMgr.exe
windows10-2004-x64
3ft12drv.dll
windows7-x64
4ft12drv.dll
windows10-2004-x64
4uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
8aaf4eba60924032f832fc6223780678_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8aaf4eba60924032f832fc6223780678_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/ngsrv/lang/howto.chm
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/ngsrv/lang/howto.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/NGSetup.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/NGSetup.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/UnloadModule.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/UnloadModule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/MoveOldVersion.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$TEMP/MoveOldVersion.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
InstDrvAction-32.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
InstDrvAction-32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
UnloadModule.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
UnloadModule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
ePassNgMgr.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
ePassNgMgr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ft12drv.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
ft12drv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
ft12drv.dll
-
Size
1.2MB
-
MD5
84b04dcb39f250df93ffe801166464d3
-
SHA1
33192e547cb2a19fbb8a146a3348708c9ac69e41
-
SHA256
f7075adfb5e24df58856606cfa6ea17c0b1d578045947c1f9298b21ee0e0929d
-
SHA512
ad84e1085d3ca122f3dfacf7f0a02becb112e82be2ac843bb02c16b09e4781c7f95adf6e5fbbb170d0fc1421906e74b03861ef4e10a87434da118a2663620672
-
SSDEEP
24576:Mfum7mrjKQP/+rnDcDf/oFdFUznul6RFuwd5I3fBZXk1:CJ7r0YFDUQ6SQcK1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Testft12_merger.cxx rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 948 836 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3712 wrote to memory of 836 3712 rundll32.exe 84 PID 3712 wrote to memory of 836 3712 rundll32.exe 84 PID 3712 wrote to memory of 836 3712 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ft12drv.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ft12drv.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 5803⤵
- Program crash
PID:948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 836 -ip 8361⤵PID:2748