Overview
overview
10Static
static
3bf244a0d9a...18.exe
windows7-x64
10bf244a0d9a...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3405.htm
windows7-x64
3405.htm
windows10-2004-x64
3SetCursor.dll
windows7-x64
3SetCursor.dll
windows10-2004-x64
3getOpenDocumentIDs.js
windows7-x64
3getOpenDocumentIDs.js
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
bf244a0d9ac81f0ca62e5b3ddfb7b72c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf244a0d9ac81f0ca62e5b3ddfb7b72c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
405.htm
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
405.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SetCursor.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SetCursor.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
getOpenDocumentIDs.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
getOpenDocumentIDs.js
Resource
win10v2004-20241007-en
General
-
Target
SetCursor.dll
-
Size
13KB
-
MD5
eca26c61607b5b8f511f73a2c820de3d
-
SHA1
cfd03bc71cb462edb70a476c956ba8a9a9a44ea5
-
SHA256
ba57adfeaf6cbe5db7e19b428552900b083e3cbf19f0d1d30f5c35c9e01f51ea
-
SHA512
b9a065b75e5f8d81de2c2bc3333ab775450c13b7ec16ed7f17c3963e969b35a4cd4a71533ba7058e2f3398136727a1cb90c1e76a3d489379299d9c89278567fc
-
SSDEEP
384:17j7k5OLLP3qw3B3GqJjxYlumCB+ubIa:lj456DbB3rxxYlum6+u
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4776 3420 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3420 2816 rundll32.exe 83 PID 2816 wrote to memory of 3420 2816 rundll32.exe 83 PID 2816 wrote to memory of 3420 2816 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SetCursor.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SetCursor.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 5443⤵
- Program crash
PID:4776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3420 -ip 34201⤵PID:680