Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
fa4ba824a689d6d8bf6738b41311951b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa4ba824a689d6d8bf6738b41311951b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ojbixxjlzk.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ojbixxjlzk.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/ojbixxjlzk.dll
-
Size
30KB
-
MD5
f5480d6c032845135dff9ebf66c46d76
-
SHA1
e76f6c75aca31ab5c1ff4695b45ec49daef23256
-
SHA256
13f7ffcefcbba343a302edaf9ceccefcf6dbae294bb9a735869d9f3fc7c522dd
-
SHA512
5164a9c8c470308a17a82f39209ea734893c7f5ccbafe9fe67bc98bb70432f46dd5faad61ad6dd8da86a88d89eb6deefb5d626abffd4ed8e8e72eba6c314d575
-
SSDEEP
768:5YH4sBQJDh7wN4Ce1UtpWOPO8P9MuVnu+OGTYgFD:5IBQJDKLPO8P9Pnu+OIh
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3976 440 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3924 wrote to memory of 440 3924 rundll32.exe 82 PID 3924 wrote to memory of 440 3924 rundll32.exe 82 PID 3924 wrote to memory of 440 3924 rundll32.exe 82 PID 440 wrote to memory of 2284 440 rundll32.exe 83 PID 440 wrote to memory of 2284 440 rundll32.exe 83 PID 440 wrote to memory of 2284 440 rundll32.exe 83 PID 440 wrote to memory of 2284 440 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ojbixxjlzk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ojbixxjlzk.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ojbixxjlzk.dll,#13⤵PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 7123⤵
- Program crash
PID:3976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 440 -ip 4401⤵PID:3596