Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
00c962a098ab666fdc400431c70809e9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
00c962a098ab666fdc400431c70809e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
10KB
-
MD5
810f3a0aefe36a9f63e29e604bea91a9
-
SHA1
2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80
-
SHA256
f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779
-
SHA512
836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb
-
SSDEEP
192:CO6dJA/ruAFEiUdWWE6hE5RYUdJfbub1argMO:XKAFERdlxhGRYUzqZar
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3020 2452 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 3024 wrote to memory of 2452 3024 rundll32.exe 31 PID 2452 wrote to memory of 3020 2452 rundll32.exe 32 PID 2452 wrote to memory of 3020 2452 rundll32.exe 32 PID 2452 wrote to memory of 3020 2452 rundll32.exe 32 PID 2452 wrote to memory of 3020 2452 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 2243⤵
- Program crash
PID:3020
-
-