Overview
overview
6Static
static
33f3e2fff45...18.exe
windows7-x64
33f3e2fff45...18.exe
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_6_/$_7_.dll
windows7-x64
6$_6_/$_7_.dll
windows10-2004-x64
6FlashGetBHO3.dll
windows7-x64
6FlashGetBHO3.dll
windows10-2004-x64
6FlashGetHook.dll
windows7-x64
3FlashGetHook.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
3f3e2fff45358876bd05df01e5684a54_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f3e2fff45358876bd05df01e5684a54_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_6_/$_7_.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$_6_/$_7_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
FlashGetBHO3.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
FlashGetBHO3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FlashGetHook.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FlashGetHook.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/ProcDll.dll
-
Size
54KB
-
MD5
4bbffba241d51d447a527891c49cd1f3
-
SHA1
df6e9617bbf060c9373e173144a9943375874a2f
-
SHA256
7883866a9143135bcec5c173293265778ac68a331bfae7efbd9d92f21fb254cd
-
SHA512
ff366b7db3970c31352dc05ce3d8b53818555b768b3d2e52ba33cc7338ba47c4aa8ae48391fe6ac8072b150aa7947e0133b558b86b9cc2a3ec286472b98f01f0
-
SSDEEP
768:pwgZqT9MKHJsa0zguI5Y90Q/WKSUT5HCMdcJfzqX2POV2vG8WT0wBJvBclpS:pwgIBMKKaOr6hUT5HSrqmPOCn2J+l4
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2004 1744 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1748 wrote to memory of 1744 1748 rundll32.exe 28 PID 1744 wrote to memory of 2004 1744 rundll32.exe 29 PID 1744 wrote to memory of 2004 1744 rundll32.exe 29 PID 1744 wrote to memory of 2004 1744 rundll32.exe 29 PID 1744 wrote to memory of 2004 1744 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ProcDll.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ProcDll.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2243⤵
- Program crash
PID:2004
-
-