Overview
overview
7Static
static
753c2a46853...18.exe
windows7-x64
753c2a46853...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$_54_/$_52_.exe
windows7-x64
7$_54_/$_52_.exe
windows10-2004-x64
3$_54_/Engine.dll
windows7-x64
3$_54_/Engine.dll
windows10-2004-x64
3$_55_/$_53_.dll
windows7-x64
3$_55_/$_53_.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7�...��.exe
windows7-x64
6�...��.exe
windows10-2004-x64
6Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 21:12
Behavioral task
behavioral1
Sample
53c2a46853de71206391e5ec3065c9de_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53c2a46853de71206391e5ec3065c9de_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$_54_/$_52_.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
$_54_/$_52_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_54_/Engine.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_54_/Engine.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_55_/$_53_.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$_55_/$_53_.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
֮.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
֮.exe
Resource
win10v2004-20241007-en
General
-
Target
$_55_/$_53_.dll
-
Size
2.8MB
-
MD5
e7d251e7fa22041a1b54c32c992e9c7d
-
SHA1
a603e83b2fff47e942df890cfec5d430125d5942
-
SHA256
62eafe940472e73e3e0beb0912b272e2c18c8f251db46c46b092335101d320cc
-
SHA512
d406c085069811efcabf2fed447aa440948c53995f6221f588b22deee8f1f06adebf717b43661f2db4bdab97e7256e88267ed87ddfb056ed737dc9423b6d56a2
-
SSDEEP
49152:cI7i3rL5SMpqcgj8hegcidF3ziSsL8M03GzoKP7ScQ2NiO2RsTD+8LzC:57i3r4Un1dFC8M02zo42RC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1064 1700 rundll32.exe 30 PID 1700 wrote to memory of 1064 1700 rundll32.exe 30 PID 1700 wrote to memory of 1064 1700 rundll32.exe 30 PID 1700 wrote to memory of 1064 1700 rundll32.exe 30 PID 1700 wrote to memory of 1064 1700 rundll32.exe 30 PID 1700 wrote to memory of 1064 1700 rundll32.exe 30 PID 1700 wrote to memory of 1064 1700 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$_55_\$_53_.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$_55_\$_53_.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1064
-