Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
a15102859e78f1a44e832dc41e67f1a6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a15102859e78f1a44e832dc41e67f1a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
6KB
-
MD5
6f4c7b51e882bf26bfc2d0046bd81e0f
-
SHA1
199b493db6425034c1ad1e37e7914a70bdc14b3f
-
SHA256
3a1a4ae579e9777a0820834841a96cf8178b11a1a255d86ba689228c512dc141
-
SHA512
d4cd78b21aae2070fd3c8f94eea68fd600472510124a8f79db5f6411b5c356686c11a4430bfdb8410410145b7b6cc1654d0de47c88abbe7204550b11a51f3d85
-
SSDEEP
96:n60uflos+dHXflPh/vQ1ckQx0BY5mpw6quiV/GBuYhEIigPviU+WYJbU+ZE:n6d+dHXLHQOPiY53uiUdigyU+WsP2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2024 2852 rundll32.exe 30 PID 2852 wrote to memory of 2024 2852 rundll32.exe 30 PID 2852 wrote to memory of 2024 2852 rundll32.exe 30 PID 2852 wrote to memory of 2024 2852 rundll32.exe 30 PID 2852 wrote to memory of 2024 2852 rundll32.exe 30 PID 2852 wrote to memory of 2024 2852 rundll32.exe 30 PID 2852 wrote to memory of 2024 2852 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2024
-