Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
cfe3f8d7c5ea48a32aa1f078d50a045a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfe3f8d7c5ea48a32aa1f078d50a045a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jtbtjyt.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jtbtjyt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/jtbtjyt.dll
-
Size
158KB
-
MD5
50717a3c230f7e5d92695291df9541c1
-
SHA1
5fca1d6d65bff01d9bb8ac82f0fb696dcfa51b4b
-
SHA256
c96ed31b77fd2f24435c2b3c9aa65b46fe05070660d6ee053bc03a8c5e547d71
-
SHA512
8e8fbcdd400ece291021a5bcbf50b693f3e122e28930539577035fabe5ad2f1ee1965349208bb17a9015c42210c3d1a20fbdc7c10f922eb213bbfbf716d9218f
-
SSDEEP
3072:MIIm67adCMGlNPm61Fu5xL22+Lw5H8QD2iWNz:MICDl9mVxa2IPhiWN
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2340 2324 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2444 wrote to memory of 2324 2444 rundll32.exe 31 PID 2324 wrote to memory of 2340 2324 rundll32.exe 32 PID 2324 wrote to memory of 2340 2324 rundll32.exe 32 PID 2324 wrote to memory of 2340 2324 rundll32.exe 32 PID 2324 wrote to memory of 2340 2324 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jtbtjyt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jtbtjyt.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2203⤵
- Program crash
PID:2340
-
-