Overview
overview
7Static
static
3cff85a4900...18.exe
windows7-x64
7cff85a4900...18.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
37boot.exe
windows7-x64
77boot.exe
windows10-2004-x64
7RIC.exe
windows7-x64
4RIC.exe
windows10-2004-x64
7Analysis
-
max time kernel
103s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
cff85a4900a440155368609d0e2ab537_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cff85a4900a440155368609d0e2ab537_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
7boot.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
7boot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RIC.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
RIC.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/ExecCmd.dll
-
Size
4KB
-
MD5
b1d08c24cad3f8f6ccd6b9ebd24d30c0
-
SHA1
d01549db25d0345c05d3c2eb90b173f937966ce5
-
SHA256
c4b6ff0091b3401670c8c6d3cb337d3ba0c2a514e66b0ea3501bb7ef78ddba69
-
SHA512
9cb5735c86cdf8d126268b7b2ec8fafd654d69bdfe5336d54b7d44b5ac8e1174836c487bb4aa40517516a55323bf9f916a96753c8dd2bc9b2d481071c9d9fbf8
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1880 1112 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1112 4172 rundll32.exe 83 PID 4172 wrote to memory of 1112 4172 rundll32.exe 83 PID 4172 wrote to memory of 1112 4172 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ExecCmd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ExecCmd.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 6003⤵
- Program crash
PID:1880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1112 -ip 11121⤵PID:5072