Overview
overview
7Static
static
7d58e75cc04...18.exe
windows7-x64
7d58e75cc04...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Dialog/7za.dll
windows7-x64
3$TEMP/Dialog/7za.dll
windows10-2004-x64
3js/bramus/...ler.js
windows7-x64
3js/bramus/...ler.js
windows10-2004-x64
3js/def.js
windows7-x64
3js/def.js
windows10-2004-x64
3js/prototy...ype.js
windows7-x64
3js/prototy...ype.js
windows10-2004-x64
3page.html
windows7-x64
3page.html
windows10-2004-x64
3page2.html
windows7-x64
3page2.html
windows10-2004-x64
3page3.html
windows7-x64
3page3.html
windows10-2004-x64
3page4.html
windows7-x64
3page4.html
windows10-2004-x64
1$TEMP/Dialog/sfx7.dll
windows7-x64
3$TEMP/Dialog/sfx7.dll
windows10-2004-x64
3opengl32/opengl32.dll
windows7-x64
7opengl32/opengl32.dll
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 03:04
Behavioral task
behavioral1
Sample
d58e75cc04bd3bd64c692aeef1170779_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d58e75cc04bd3bd64c692aeef1170779_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/Dialog/7za.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/Dialog/7za.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
js/bramus/jsProgressBarHandler.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
js/bramus/jsProgressBarHandler.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
js/def.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
js/def.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
js/prototype/prototype.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
js/prototype/prototype.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
page.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
page.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
page2.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
page2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
page3.html
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
page3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
page4.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
page4.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/Dialog/sfx7.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$TEMP/Dialog/sfx7.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
opengl32/opengl32.dll
Resource
win7-20240903-en
General
-
Target
opengl32/opengl32.dll
-
Size
79KB
-
MD5
2c466e055126d6e39938b3451fc77184
-
SHA1
c4354793dc7a49d5f171fe496088df76d7f6e0ff
-
SHA256
e0693f7752e6088923b31d3faf7db1a0b5989838d7c250bddb6c175c17891537
-
SHA512
015f366aed0c823158af1beaa8d6514d1afe90bfda0ac1eb6074340031e9ce14f1f5eb3aa3e47a34ada70c036949c58df1679a22338cc15da3ee352ab1889c9b
-
SSDEEP
1536:tG0tELS/PLvgM/CNn1p1q6eG+yMCkA2MiuePFGnj+TdfQRa1y5BnJAGV:LMEvanhe2k1MiuAGnjwZQRb9JAGV
Malware Config
Signatures
-
resource yara_rule behavioral23/memory/2684-2-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral23/memory/2684-3-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral23/memory/2684-1-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral23/memory/2684-0-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral23/memory/2684-4-0x0000000010000000-0x000000001004B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2684 2372 rundll32.exe 30 PID 2372 wrote to memory of 2684 2372 rundll32.exe 30 PID 2372 wrote to memory of 2684 2372 rundll32.exe 30 PID 2372 wrote to memory of 2684 2372 rundll32.exe 30 PID 2372 wrote to memory of 2684 2372 rundll32.exe 30 PID 2372 wrote to memory of 2684 2372 rundll32.exe 30 PID 2372 wrote to memory of 2684 2372 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\opengl32\opengl32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\opengl32\opengl32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2684
-