Overview
overview
7Static
static
3123d870c6a...18.exe
windows7-x64
7123d870c6a...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
123d870c6a994a5dabc28afcea2377f0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
123d870c6a994a5dabc28afcea2377f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/SkinnedControls.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/SkinnedControls.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/SkinnedControls.dll
-
Size
68KB
-
MD5
c3e5d1a39e1f4dc8317a9e71ce93d141
-
SHA1
7f1e4bcfb2a6b58b5e337d58713eb27dfb2afef4
-
SHA256
512d67d40f6c73a8c7ce63060962b7632c47b528f340f152fbbda6ab12883579
-
SHA512
32b5c5439a1d58f4fcc9348d0a91ed6c4ecf5bec3abc646a345a2256060a962978a7fc9a5ce155ad1498a1d6f77dac29d433e9398252bd66b1d89875447e4603
-
SSDEEP
1536:pFkV9DWMRT1Cjz0rc2T7pWhpPZMcgnutbGFL3e4tTBMcMY8:peTDhRMz0rcJPCcRYu4tTB/V
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2376 2356 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2348 wrote to memory of 2356 2348 rundll32.exe 30 PID 2356 wrote to memory of 2376 2356 rundll32.exe 31 PID 2356 wrote to memory of 2376 2356 rundll32.exe 31 PID 2356 wrote to memory of 2376 2356 rundll32.exe 31 PID 2356 wrote to memory of 2376 2356 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SkinnedControls.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\SkinnedControls.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 2243⤵
- Program crash
PID:2376
-
-