Overview
overview
10Static
static
3f97f261075...18.exe
windows7-x64
10f97f261075...18.exe
windows10-2004-x64
10$APPDATA/s...60.dll
windows7-x64
1$APPDATA/s...60.dll
windows10-2004-x64
1$APPDATA/s...er.dll
windows7-x64
1$APPDATA/s...er.dll
windows10-2004-x64
1$APPDATA/s...ui.dll
windows7-x64
1$APPDATA/s...ui.dll
windows10-2004-x64
1$APPDATA/s...ls.dll
windows7-x64
3$APPDATA/s...ls.dll
windows10-2004-x64
3$APPDATA/w...t2.exe
windows7-x64
$APPDATA/w...t2.exe
windows10-2004-x64
$APPDATA/w...ms.dll
windows7-x64
1$APPDATA/w...ms.dll
windows10-2004-x64
1$TEMP/Tenr...ar.dll
windows7-x64
10$TEMP/Tenr...ar.dll
windows10-2004-x64
10$TEMP/crm/...te.dll
windows7-x64
1$TEMP/crm/...te.dll
windows10-2004-x64
1$TEMP/crm/...dm.exe
windows7-x64
1$TEMP/crm/...dm.exe
windows10-2004-x64
1$TEMP/rede...UI.dll
windows7-x64
1$TEMP/rede...UI.dll
windows10-2004-x64
1Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
f97f261075ab2aa2bffa7e55db878dd9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f97f261075ab2aa2bffa7e55db878dd9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$APPDATA/scriptlibrary/39.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/scriptlibrary/39.opends60.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$APPDATA/scriptlibrary/MCppCodeDomProvider.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$APPDATA/scriptlibrary/MCppCodeDomProvider.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$APPDATA/scriptlibrary/autolaytui.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$APPDATA/scriptlibrary/autolaytui.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$APPDATA/stow/gutils.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$APPDATA/stow/gutils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$APPDATA/with/count/ConmanClient2.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$APPDATA/with/count/ConmanClient2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$APPDATA/with/count/MicrosoftWindowsCEForms.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$APPDATA/with/count/MicrosoftWindowsCEForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/TenrecSaggar.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$TEMP/TenrecSaggar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/crm/IEExecRemote.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$TEMP/crm/IEExecRemote.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$TEMP/crm/StoreAdm.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$TEMP/crm/StoreAdm.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/redesign/pbo/ProjWizUI.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$TEMP/redesign/pbo/ProjWizUI.dll
Resource
win10v2004-20240802-en
General
-
Target
$APPDATA/stow/gutils.dll
-
Size
41KB
-
MD5
657d1d110e247fec5b6653f69c562e9a
-
SHA1
ab92a9a74c55c5e5d05f1f3dde518371dda76548
-
SHA256
9a77a59e040e99459d1ab2be8c5721b0c61aa608abb81c24e7b355f1c2f49176
-
SHA512
1faaa0140ed68a335e9c6067767dd8514c635e5a222e611c52e2fa1fd66d39263f4a928bf71843b8bc0a0355ca008408af5f9cf67e82e96c139ce291871074a4
-
SSDEEP
768:qlcsy/f7ZAVLfhvKsUNfK74vGHpXwIxYD7LCKD0k7u1WZ7gxU9:ay/TZULfhyHE744wIxy10kSO7H9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 4436 436 rundll32.exe 82 PID 436 wrote to memory of 4436 436 rundll32.exe 82 PID 436 wrote to memory of 4436 436 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$APPDATA\stow\gutils.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$APPDATA\stow\gutils.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4436
-