Overview
overview
3Static
static
35245046132...18.exe
windows7-x64
35245046132...18.exe
windows10-2004-x64
3$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R1.dll
windows7-x64
3$R1.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
5245046132bb52c8cfa68806d40ea381_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5245046132bb52c8cfa68806d40ea381_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$R1.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$R1.dll
Resource
win10v2004-20241007-en
General
-
Target
$R1.dll
-
Size
573KB
-
MD5
63b606d144d98dbed8556c10d2b27e48
-
SHA1
31871607b323c7b05071015fdf68fe20b6b3951d
-
SHA256
ed87272bec2dab985dc210cc319050c3d45872ba4024d07f36f7d7ab501e4480
-
SHA512
a31478f46f7b79b918eaa1145c02c0eb2ba57cf02faae4156bdd8becd0f31d5aaa59b9638a0b0d2dcffbf30079da609192c11bb8ea8730bacaa95efc15f9747d
-
SSDEEP
12288:Ov/XpXAOvduxqA82UPaE5m+LrCHIk9ymCYjDC4vc:OX5KH82UyHIkuQD7vc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2388 2368 rundll32.exe 30 PID 2368 wrote to memory of 2388 2368 rundll32.exe 30 PID 2368 wrote to memory of 2388 2368 rundll32.exe 30 PID 2368 wrote to memory of 2388 2368 rundll32.exe 30 PID 2368 wrote to memory of 2388 2368 rundll32.exe 30 PID 2368 wrote to memory of 2388 2368 rundll32.exe 30 PID 2368 wrote to memory of 2388 2368 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R1.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2388
-