Overview
overview
10Static
static
3d3712f81b1...18.exe
windows7-x64
10d3712f81b1...18.exe
windows10-2004-x64
10$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/vays...52.exe
windows7-x64
10$TEMP/vays...52.exe
windows10-2004-x64
10$TEMP/windll.dll
windows7-x64
10$TEMP/windll.dll
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
d3712f81b1dd98d78d99b0d639e64232_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3712f81b1dd98d78d99b0d639e64232_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/vaysoft-image-to-exe-converter-4.52.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/vaysoft-image-to-exe-converter-4.52.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMP/windll.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
$TEMP/windll.dll
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/windll.dll
-
Size
84KB
-
MD5
a20e8c18d8c26630407ca9a20dfe3ea9
-
SHA1
e5a28f8452144da79e09dfdff658a8ecb3c3e222
-
SHA256
8fe1124a3283b484243bf781c42b3361f7ad55c495f41e9b9868e719d3f1e497
-
SHA512
8475e142da0ec7ce5c9fb3b70e110e78670b3690f323cbfcfd5373dd954a8ca23c2d0e7d9a35befbccc5247d551a1bd9b92642a9d61018514a708fbc05fcaa0e
-
SSDEEP
1536:5blyFuzuyuFw1q3Hc96EBUdiTMKTg0gfxunQ9SIq7S6Eo1tRf0xHn:5blpzWzXc0kUmPMNZunQ9CH1tmx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\WorkOffline = "{b554314f-f6b3-4b75-9fc4-b5b38a2961db}" regsvr32.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 regsvr32.exe 2252 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Work\WorkOffline.dll regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b554314f-f6b3-4b75-9fc4-b5b38a2961db}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b554314f-f6b3-4b75-9fc4-b5b38a2961db} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b554314f-f6b3-4b75-9fc4-b5b38a2961db}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b554314f-f6b3-4b75-9fc4-b5b38a2961db}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Work\\WorkOffline.dll" regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2252 regsvr32.exe 2252 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2252 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2252 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 348 wrote to memory of 2252 348 regsvr32.exe 82 PID 348 wrote to memory of 2252 348 regsvr32.exe 82 PID 348 wrote to memory of 2252 348 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\$TEMP\windll.dll1⤵
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\$TEMP\windll.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5a20e8c18d8c26630407ca9a20dfe3ea9
SHA1e5a28f8452144da79e09dfdff658a8ecb3c3e222
SHA2568fe1124a3283b484243bf781c42b3361f7ad55c495f41e9b9868e719d3f1e497
SHA5128475e142da0ec7ce5c9fb3b70e110e78670b3690f323cbfcfd5373dd954a8ca23c2d0e7d9a35befbccc5247d551a1bd9b92642a9d61018514a708fbc05fcaa0e