Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
c8cd3c8b932d0d8bb2b9b851259e85af_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8cd3c8b932d0d8bb2b9b851259e85af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
oird.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
oird.dll
Resource
win10v2004-20240802-en
General
-
Target
oird.dll
-
Size
61KB
-
MD5
cf4ae210908c96902bc5b7f418bc07f2
-
SHA1
17b7e94ab427967f73496882207a857eaf32f4d8
-
SHA256
d2cbc91d8a57bbcb023ae76bf4d53f2e77a06df828c78ec23ddcf9be333a2d45
-
SHA512
234fc71cd2acc461a84b762f2ac73d736ca2844a4d2fd4003e438e1ee3fcde07778c562b9b92d672c7c8cef18c14764bb7b8d9393f68e1ea8c471fdac9c2ac70
-
SSDEEP
1536:3kenDMLT/44vMGrYZYPsrqN6hBsmM3erDx:UIgLTj9kSPsmN6MmM3erD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\name = "C:\\Users\\Admin\\AppData\\Roaming\\folder\\file.exe" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1724 2220 rundll32.exe 30 PID 2220 wrote to memory of 1724 2220 rundll32.exe 30 PID 2220 wrote to memory of 1724 2220 rundll32.exe 30 PID 2220 wrote to memory of 1724 2220 rundll32.exe 30 PID 2220 wrote to memory of 1724 2220 rundll32.exe 30 PID 2220 wrote to memory of 1724 2220 rundll32.exe 30 PID 2220 wrote to memory of 1724 2220 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\oird.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\oird.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1724
-