Analysis
-
max time kernel
91s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 10:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5d671adb11b9ba100b3be4ca7c45880f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d671adb11b9ba100b3be4ca7c45880f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/chbtjlxnc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/chbtjlxnc.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/chbtjlxnc.dll
-
Size
32KB
-
MD5
04e7cb86dc41703a5cf85fc5876ca52c
-
SHA1
c1b4b144bcfbb9cb60f0feb98c74aeb1ca83abea
-
SHA256
f151cb8d01bd600340425aed959eff4e663db50941ccba81bee3d94f5ae4e486
-
SHA512
7c38ab8869747baa87473804cca219969534b71cfdd91b01e2a63b84fc7964fbdbbff7f56f336c2d5bac4031e8ede1e39e1d723854f3f7713b9d1ec37f7d3646
-
SSDEEP
768:jm79oRz5DjnPKkSnu9OfiIkuy8nEVFCvLSVrSIaonoIxGRBUxNku6:SPqFZdaontxGUxNZ6
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4752 1968 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1968 2876 rundll32.exe 83 PID 2876 wrote to memory of 1968 2876 rundll32.exe 83 PID 2876 wrote to memory of 1968 2876 rundll32.exe 83 PID 1968 wrote to memory of 3928 1968 rundll32.exe 84 PID 1968 wrote to memory of 3928 1968 rundll32.exe 84 PID 1968 wrote to memory of 3928 1968 rundll32.exe 84 PID 1968 wrote to memory of 3928 1968 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\chbtjlxnc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\chbtjlxnc.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\chbtjlxnc.dll,#13⤵PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 6643⤵
- Program crash
PID:4752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1968 -ip 19681⤵PID:2560