Overview
overview
7Static
static
3ea5209468b...18.exe
windows7-x64
7ea5209468b...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/TBC.dll
windows7-x64
3$PLUGINSDIR/TBC.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ct.dll
windows7-x64
3$PLUGINSDI...ct.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
ea5209468b3dc2a9f24010a7c75cc019_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5209468b3dc2a9f24010a7c75cc019_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/TBC.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/TBC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/t8bprtct.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/t8bprtct.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/TBC.dll
-
Size
94KB
-
MD5
ec0281fd243bffbfe3cf1558e99b51fc
-
SHA1
2841c1e42a06d618db54dedc9a5aee48c1c9869a
-
SHA256
902ce26a56b68e18f4360c7b6a3221757377af06e9125bdaeed8f1290d999659
-
SHA512
a117af91d786ef824f0b0f978cbc15ebc098f6b57481888d97f0ce503ce39e4a6312cd51ffe32625cbe8c4d019f5b40a4d796608c22eeb95d97150c57080d99c
-
SSDEEP
1536:ahu/kdI2gfoH4wL5T/WFxQG68gK4T765JXffhi4HUOk1m59bd9tgvpk:l+gwYET/sE7oXffhkmvbd9tgvpk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4352 3224 rundll32.exe 82 PID 3224 wrote to memory of 4352 3224 rundll32.exe 82 PID 3224 wrote to memory of 4352 3224 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\TBC.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\TBC.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4352
-