Overview
overview
10Static
static
314882f903f...18.exe
windows7-x64
1014882f903f...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/sponsor.dll
windows7-x64
3$TEMP/sponsor.dll
windows10-2004-x64
3Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14882f903f963d5b5231a7aeed89ab81_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/sponsor.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/sponsor.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/sponsor.dll
-
Size
9KB
-
MD5
6e17b30ff21d147b4b11329b0e88d0f7
-
SHA1
f3dfbdc3966ec9b8d1df73c14c7617843dcc507c
-
SHA256
7ff10984f4cb404b2f91b7d5053b85055435b321b23e96302640250740ee8fbe
-
SHA512
91f135dbfccec48867e12e6e5b87f82b8268ee55252c3d75c5d96bba96c03b722bb805a27b64ca2f5d09afa27943f7b80a5a33c153a9dbc17f1c057fc20bc8a7
-
SSDEEP
96:HJXSN54BcBhwfcYYOa670/XUjTplrOJqgDE0jDlxqE58wVAPNP9JLSj+PYKZJ:HpSN2BcHwfpNAGPrOjAYlxWw8+E
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4412 3528 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4092 wrote to memory of 3528 4092 rundll32.exe rundll32.exe PID 4092 wrote to memory of 3528 4092 rundll32.exe rundll32.exe PID 4092 wrote to memory of 3528 4092 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\sponsor.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\sponsor.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 6003⤵
- Program crash
PID:4412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3528 -ip 35281⤵PID:1056