Overview
overview
7Static
static
3123bb10f1b...18.exe
windows7-x64
7123bb10f1b...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3DocDrag.chm
windows7-x64
1DocDrag.chm
windows10-2004-x64
1HTMLParse.dll
windows7-x64
3HTMLParse.dll
windows10-2004-x64
3RecoverSetup.exe
windows7-x64
3RecoverSetup.exe
windows10-2004-x64
3SCommCtl.dll
windows7-x64
3SCommCtl.dll
windows10-2004-x64
3SDbAPI.dll
windows7-x64
3SDbAPI.dll
windows10-2004-x64
3SDocCatch.dll
windows7-x64
3SDocCatch.dll
windows10-2004-x64
3SDocDB.dll
windows7-x64
3SDocDB.dll
windows10-2004-x64
3SDocDrag.exe
windows7-x64
3SDocDrag.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7hha.dll
windows7-x64
3hha.dll
windows10-2004-x64
3hhc.exe
windows7-x64
3hhc.exe
windows10-2004-x64
3seesi.url
windows7-x64
6seesi.url
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
123bb10f1b9392e5d0c1816dbe29c8f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
123bb10f1b9392e5d0c1816dbe29c8f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DocDrag.chm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
DocDrag.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
HTMLParse.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
HTMLParse.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RecoverSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
RecoverSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SCommCtl.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SCommCtl.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
SDbAPI.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
SDbAPI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
SDocCatch.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
SDocCatch.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
SDocDB.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
SDocDB.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
SDocDrag.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
SDocDrag.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
hha.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
hha.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
hhc.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
hhc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
seesi.url
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
seesi.url
Resource
win10v2004-20240802-en
General
-
Target
HTMLParse.dll
-
Size
88KB
-
MD5
cda5b33c69c80b2ca7f33d4ff6cf54cf
-
SHA1
bdac81ec3e0f9eefc74d1092e149ffbd48de472f
-
SHA256
48636e27fb4deb1208b9599c81ac0860b709801c7f9acd1cd8df56498453ecb0
-
SHA512
53d9c080f22d35ca029f098d0eebf9241bb83d1339f7d615f04d4847afe4529e22e8c3ab2fc532c14d33c4fec8535467fe637f10bf5cd57480e16bbc44b43c16
-
SSDEEP
768:3GwrXwhqec+QtyLwA09iaTd/hmvQBjrSo8SpVCltvQ3nPCuGv34O1+dZu:XAMeWX9i0/bXSo8SO7QnPC7voOyZu
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3056 2552 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 2552 4148 rundll32.exe 82 PID 4148 wrote to memory of 2552 4148 rundll32.exe 82 PID 4148 wrote to memory of 2552 4148 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\HTMLParse.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\HTMLParse.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 6723⤵
- Program crash
PID:3056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2552 -ip 25521⤵PID:316