Overview
overview
7Static
static
3a202f186f5...18.exe
windows7-x64
7a202f186f5...18.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISList.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISList.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/NSISList.dll
-
Size
97KB
-
MD5
2e0785f18f8714393bc4bc1fe170eadf
-
SHA1
1efba431c0fac46c6cb6f60dc08f65a0e23ccf3d
-
SHA256
e68d65626b24e7c1f6fbe1001f43174d0243095181025736f37ad704662f4351
-
SHA512
8a272bb264fa066960a4f34411a81652839eccdbc6fa25be20c0b94d7d10b16cb568338abb5d1a96c155cbc4bc7923d0387fa36bed69c1021296cc6cc5fbb45e
-
SSDEEP
3072:MoENnpXlyqLIslzjPfJ4/EiJtu0s+8Q0wRwFP:MoEf1ySz6Jsx5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30 PID 1900 wrote to memory of 2168 1900 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISList.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\NSISList.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2168
-