Overview
overview
10Static
static
1037278f8113...18.rar
windows7-x64
137278f8113...18.rar
windows10-2004-x64
1DuoWei.dll
windows7-x64
10DuoWei.dll
windows10-2004-x64
5Providence.exe
windows7-x64
10Providence.exe
windows10-2004-x64
10idix.dll
windows7-x64
3idix.dll
windows10-2004-x64
3请先下�....0.url
windows7-x64
1请先下�....0.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 22:37
Behavioral task
behavioral1
Sample
37278f8113745774640f5b647de0bf7a_JaffaCakes118.rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
37278f8113745774640f5b647de0bf7a_JaffaCakes118.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DuoWei.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DuoWei.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Providence.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Providence.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
idix.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
idix.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
请先下载安装.NETFramework4.0.url
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
请先下载安装.NETFramework4.0.url
Resource
win10v2004-20241007-en
General
-
Target
idix.dll
-
Size
87KB
-
MD5
ac147ebbabaec4b9262df61984728d27
-
SHA1
dfb93606bf1a0595bc5d2bcdac4fd2e1ac93aa33
-
SHA256
5389e114977175693b51ae5e1581a2e7ef0574f6335e7585de3cbf49cbb3e037
-
SHA512
0ce6edb9f4c051af9150376f4f827ba0282e8c398cc18c6cb0b08b71d23803df30bd0df7681800b54fd67660a165200b009103485d523fd00209ae816bf61d55
-
SSDEEP
1536:FM5TuEZuOXDTRFI1HLFW0knPUk8MpyrpsFMKY7wtvoTrJmccX:FM5TDkE7WrFzYGhsF+7soTrJmcE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2908 3472 rundll32.exe 83 PID 3472 wrote to memory of 2908 3472 rundll32.exe 83 PID 3472 wrote to memory of 2908 3472 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\idix.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\idix.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2908
-