Overview
overview
7Static
static
3c085a92187...18.exe
windows7-x64
7c085a92187...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3$R2/NSIS.L...0_.exe
windows7-x64
1$R2/NSIS.L...0_.exe
windows10-2004-x64
3$TEMP/CloudTool.exe
windows7-x64
1$TEMP/CloudTool.exe
windows10-2004-x64
3$TEMP/LongRADrv.sys
windows7-x64
1$TEMP/LongRADrv.sys
windows10-2004-x64
1$TEMP/LongRADrv2K.sys
windows7-x64
1$TEMP/LongRADrv2K.sys
windows10-2004-x64
17zxr.dll
windows7-x64
37zxr.dll
windows10-2004-x64
3LongRADrv.sys
windows7-x64
1LongRADrv.sys
windows10-2004-x64
1LongRADrv2K.sys
windows7-x64
1LongRADrv2K.sys
windows10-2004-x64
1LongRAShell.exe
windows7-x64
3LongRAShell.exe
windows10-2004-x64
3cloud.exe
windows7-x64
3cloud.exe
windows10-2004-x64
3mycompress.dll
windows7-x64
3mycompress.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7LongRADrv.sys
windows7-x64
1LongRADrv.sys
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
c085a92187e2c7d5fcdc82ed4668134f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c085a92187e2c7d5fcdc82ed4668134f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$R0.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$R2/NSIS.Library.RegTool.v2.$_10_.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$R2/NSIS.Library.RegTool.v2.$_10_.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/CloudTool.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$TEMP/CloudTool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/LongRADrv.sys
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$TEMP/LongRADrv.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/LongRADrv2K.sys
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$TEMP/LongRADrv2K.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
7zxr.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
7zxr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
LongRADrv.sys
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
LongRADrv.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
LongRADrv2K.sys
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
LongRADrv2K.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
LongRAShell.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
LongRAShell.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
cloud.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
cloud.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
mycompress.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
mycompress.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
LongRADrv.sys
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
LongRADrv.sys
Resource
win10v2004-20240802-en
General
-
Target
7zxr.dll
-
Size
82KB
-
MD5
cbc8a718ff581e53d5e40f7859518c85
-
SHA1
ada53e9ebb60956699795859317dede6baed5750
-
SHA256
26dea35825ab01a6e05bc3405766ebb10ca57ee1cd300d76f9a53adc71b6457d
-
SHA512
96308f736d1dfb3bc3241a028f08ca7aa8551bfc7dc7f9190fb319f0f438d05721ef041924a12c47b917c5c29bb35ae286a5f367452237326f0060b2265cc935
-
SSDEEP
1536:UybbuP3exTJC1DOSxH/1cW1z/JwVQOld+5zB:hbYsdCtOSxH/Gg/JgtlA5zB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 4564 1292 rundll32.exe 84 PID 1292 wrote to memory of 4564 1292 rundll32.exe 84 PID 1292 wrote to memory of 4564 1292 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7zxr.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7zxr.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4564
-