Overview
overview
10Static
static
30535498d42...18.exe
windows7-x64
100535498d42...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3NsResize.dll
windows7-x64
3NsResize.dll
windows10-2004-x64
3dbtoepub
ubuntu-18.04-amd64
1dbtoepub
debian-9-armhf
1dbtoepub
debian-9-mips
1dbtoepub
debian-9-mipsel
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
0535498d42c6e270db089f64b34f8d02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0535498d42c6e270db089f64b34f8d02_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
NsResize.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
NsResize.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
dbtoepub
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
dbtoepub
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
dbtoepub
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
dbtoepub
Resource
debian9-mipsel-20240729-en
General
-
Target
NsResize.dll
-
Size
87KB
-
MD5
2a37de04157fcc12c2cd20ae21abb6b9
-
SHA1
78d584c34d0c6231cd63f9cc7e6bd19c95044d66
-
SHA256
d3c81a5884473fb14b88733fb66c7cc18198c65967c1e45651396b96a1687e2e
-
SHA512
7b67c372151cec82e442fa02b9b9f40a339753b77b7c82cbb54d9634f194a9dd44883010d2b7bba14bf8ed91ca49688c5a0e81e1016d11b405901319981237ed
-
SSDEEP
1536:2kG+Uh+mtdZ8h1uZoMUXF5+TtThc1NHaWirFW+BCp1euMRWWvIVhVxFDBjj/yp5t:6RXKgo0sK6YEXLtLA5XsC5v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1924 1884 rundll32.exe 30 PID 1884 wrote to memory of 1924 1884 rundll32.exe 30 PID 1884 wrote to memory of 1924 1884 rundll32.exe 30 PID 1884 wrote to memory of 1924 1884 rundll32.exe 30 PID 1884 wrote to memory of 1924 1884 rundll32.exe 30 PID 1884 wrote to memory of 1924 1884 rundll32.exe 30 PID 1884 wrote to memory of 1924 1884 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NsResize.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NsResize.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1924
-