Overview
overview
7Static
static
7e9bedfa562...18.exe
windows7-x64
7e9bedfa562...18.exe
windows10-2004-x64
7$TEMP/Team...r_.exe
windows7-x64
7$TEMP/Team...r_.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$TEMP/Team...AS.exe
windows7-x64
1$TEMP/Team...AS.exe
windows10-2004-x64
1$TEMP/Team...TV.dll
windows7-x64
1$TEMP/Team...TV.dll
windows10-2004-x64
3$TEMP/Team...er.exe
windows7-x64
7$TEMP/Team...er.exe
windows10-2004-x64
7$TEMP/Team...ce.exe
windows7-x64
1$TEMP/Team...ce.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 10:06
Behavioral task
behavioral1
Sample
e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$TEMP/TeamViewer/Version4/TeamViewer_.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$TEMP/TeamViewer/Version4/TeamViewer_.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$TEMP/TeamViewer/Version4/SAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$TEMP/TeamViewer/Version4/SAS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$TEMP/TeamViewer/Version4/TV.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$TEMP/TeamViewer/Version4/TV.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$TEMP/TeamViewer/Version4/TeamViewer.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/TeamViewer/Version4/TeamViewer.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral21
Sample
$TEMP/TeamViewer/Version4/TeamViewer_Service.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$TEMP/TeamViewer/Version4/TeamViewer_Service.exe
Resource
win10v2004-20240226-en
General
-
Target
e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
e9bedfa5624c03bc97f4b483b65d8fdf
-
SHA1
2c3247266cf332285df6da5817e2b28f88a9f3de
-
SHA256
09f74ca0de08a2181671b49c9f399fdcfbcc8d21f08d216bbdbbb4501104f57a
-
SHA512
324bf29a17275e66da725a4a935e96f9b9a1ee5ee6f13453c61915f7f09c58540dfe7b95e8f062a4d5272f04e2487662f4020af2e56425538486ee1bf30200af
-
SSDEEP
24576:xnQms4iJjg5Q7wa/Dv1GHafqeh2LtKLV9zvKO8B2cIHAH9I9gNMrIs0tuo4x527B:xnqsRa/Dv4EWIzzvKO8PwgNMrStuF52t
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation TeamViewer_.exe -
Executes dropped EXE 2 IoCs
pid Process 2416 TeamViewer_.exe 3180 TeamViewer.exe -
Loads dropped DLL 7 IoCs
pid Process 2416 TeamViewer_.exe 2416 TeamViewer_.exe 2416 TeamViewer_.exe 2416 TeamViewer_.exe 2416 TeamViewer_.exe 2416 TeamViewer_.exe 3180 TeamViewer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1224-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0007000000023206-5.dat upx behavioral2/memory/1224-8-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2416-9-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2416-62-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\QS\SAS.exe TeamViewer.exe File created C:\Program Files (x86)\QS\SAS.exe TeamViewer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3180 TeamViewer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3180 TeamViewer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2416 1224 e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe 88 PID 1224 wrote to memory of 2416 1224 e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe 88 PID 1224 wrote to memory of 2416 1224 e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe 88 PID 2416 wrote to memory of 3180 2416 TeamViewer_.exe 89 PID 2416 wrote to memory of 3180 2416 TeamViewer_.exe 89 PID 2416 wrote to memory of 3180 2416 TeamViewer_.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9bedfa5624c03bc97f4b483b65d8fdf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\temp\TeamViewer\Version4\TeamViewer_.exe"C:\Users\Admin\temp\TeamViewer\Version4\TeamViewer_.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\temp\TeamViewer\Version4\TeamViewer.exe"C:\Users\Admin\temp\TeamViewer\Version4\TeamViewer.exe" --qsc --pw ""3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD59459a28dbb2752d59eaa8fbb5cf8c982
SHA14ad7eb230cf6d05df967037225fa19dd385bf7cb
SHA2564688dcd01db816485a770cb8fc047fef9a408f3dbec5a2c83752fee115ce6963
SHA5127dff6414f4215aa4c7a168158b4ac5dd422c7dd35c6af58bce658c6bf9bf5a3545a5ee0db5f5d47a17c7ae53cb54551b98b492137e36c73e684b2041d775cd97
-
Filesize
5KB
MD5c6910d6e78c2e5f9d57d0bc6d8f6b736
SHA1a395099062298b3f3c015359b227ca02a72c6e2c
SHA256b2c32af2b0d75dfd08ae4e1ad7c5897957240b32bf7a16855d6a46512d272b9b
SHA5124cd45b887ce5b7fecfd863cae83817465d7378cc9f5b50f5762d5f209c55a37257d94e91dea4c91c66f2c5bf22cdc1f5545eeef52a090f05cceeedf59bbd2a10
-
Filesize
10KB
MD5cfbae93f361e2b430743e423709a483f
SHA19d31546592a9e6817025cc5026fee769e9a6c015
SHA2560f4aac375087f0a5df393d7463bd462193008922136a2aba8619736223ba7add
SHA512485bc9c83087a1a6f48a5508ee390384c2db93b9d50c295280337dad78b47f65aaa0caea8d6d23ef25f86b73cd2e724cb88a738f6b53037e47225c6522f912b3
-
Filesize
53KB
MD5bf3bcd752bdabfa1f1e84b7462738103
SHA134cb8ea7d47467cace271e03b7869f37b0ecb30a
SHA25690fe790e189c384f2ab82958057f91fdf40888c2ed3c0471bd7b85d5b36c7810
SHA5126d5362c4d354319845f4522e0d1132c32a6779efc4c013c8c7bd489fddf39cbb5dfb72b135487b660d156d7774e5be4acc03c3fcecdb6dabcfad12630a3f5955
-
Filesize
64KB
MD54b030749eef3498b8efbaf2877a59fb5
SHA170d65a57582fa7145bcf7198e0751e5a3bfffcc5
SHA256ee4f367a4074fa13d15eb17ae9e140d38b249959a29d6e4146c0577df2fed01b
SHA5129a265c06a377bbcaba9b6b0e2752657701fd1fb82613d7ba520e4739108951d0059e1c8d7533a3e94928e5971a9d2fc575d3adc67f4ac768f844c63a5e11e8c7
-
Filesize
3.4MB
MD52e027f3b572c218c64d6a511b14a4187
SHA1eeb9ac3cbd08834c7ae71c79fb3d77c98f174d80
SHA256efc1c03fe3e38079ac2c12f86ba6fdcc4889a22738539e82293f9f008d60a101
SHA5124f05f6232bf5f13a545022de1a097755d17a4d3414cf1a97d854cacb4e57ad8835778d638541632ef23730bb43dbe4b4d521cc042617aabc0f14a01b58becaf5
-
Filesize
452B
MD5864d6a8d6253aec55b990b3b178c255d
SHA1c8a3283d6bc2cc9e7c38a401337bf43fc5fde465
SHA256d94df105801813992dba1f18a9be3d165585a1138118f4c833fa70097c6cf858
SHA512f22553ca2da48880543d3bf58c5ad470568b02c8103c2dbb79212fc659aa182cd8c7de104afa48313be868699081f5d2c182aec56ac8dee676c24d0403a3f503
-
Filesize
1.4MB
MD5acf29765d8cf2b26ecb3f8c373a1e6e7
SHA113c10b8f6cb01afece13c7428ee87c2c86e62064
SHA256d0a6b4abf0cc538015de5ea61b8f812bfa115f3457c1c698cd8620aab25f8f7c
SHA512fa210e9092b996b3ab4ecd93081a637b28b2c3f17434a0e85acfaff9904e84bf7f2aacad418af4211b84626cefe0bf4defba850081abb7631f0721fd10791635
-
Filesize
51KB
MD5ced6ada8ab91706b197996b798b6b29a
SHA1279b57480e04968d87b3d3fc33ef62b61a7eae37
SHA2569ac677f9f7eaf198f804e14adc550020cc5de119ea5c4c502529cc27e12c9361
SHA512be1ea786a176df81d71e27555db5ca38d4f68febe54057f59d02560108df225a31b9bd41f066d72506c2cdb3bb4812127b7c46336818dd21f37518c45b94258e