Overview
overview
10Static
static
10ed03f8136c...18.exe
windows7-x64
7ed03f8136c...18.exe
windows10-2004-x64
7$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
7$PLUGINSDI...om.dll
windows10-2004-x64
7$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$TEMP/v.vbs
windows7-x64
3$TEMP/v.vbs
windows10-2004-x64
3$TEMP/xcmd.exe
windows7-x64
9$TEMP/xcmd.exe
windows10-2004-x64
9$_48_/$APP...md.exe
windows7-x64
9$_48_/$APP...md.exe
windows10-2004-x64
9$_48_/1.html
windows7-x64
6$_48_/1.html
windows10-2004-x64
1$_48_/3.bat
windows7-x64
1$_48_/3.bat
windows10-2004-x64
1$_48_/3.vbs
windows7-x64
4$_48_/3.vbs
windows10-2004-x64
7$_48_/qq.vbs
windows7-x64
3$_48_/qq.vbs
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 08:42
Behavioral task
behavioral1
Sample
ed03f8136c974575f1995a02588027fd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed03f8136c974575f1995a02588027fd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$TEMP/v.vbs
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/v.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$TEMP/xcmd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$TEMP/xcmd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$_48_/$APPDATA/xcmd.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$_48_/$APPDATA/xcmd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$_48_/1.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
$_48_/1.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$_48_/3.bat
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$_48_/3.bat
Resource
win10v2004-20240319-en
Behavioral task
behavioral29
Sample
$_48_/3.vbs
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$_48_/3.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$_48_/qq.vbs
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$_48_/qq.vbs
Resource
win10v2004-20240226-en
General
-
Target
$_48_/3.vbs
-
Size
2KB
-
MD5
a1e554f682917f550a2e2724e4de948a
-
SHA1
b969a24c3581b7a3c8a1493bb5f28410b3359dce
-
SHA256
2b4aa2bd62996af03ef4669df853ecb883e676e9ddbb92139d43413fabbad0c0
-
SHA512
dfdc643f220be01c6ee9c90970ed84887038d8dd3199c8092d435d8cf6e5ac75a3f2f2b2f5fe020c8bcf0cfcefc64af28d91ef77b80075380b071c284e59c2ad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in Program Files directory 1 IoCs
Processes:
WScript.exedescription ioc process File created C:\Program Files\NetMeeting\ie.html WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 728 wrote to memory of 3660 728 WScript.exe attrib.exe PID 728 wrote to memory of 3660 728 WScript.exe attrib.exe PID 728 wrote to memory of 3076 728 WScript.exe cmd.exe PID 728 wrote to memory of 3076 728 WScript.exe cmd.exe PID 3076 wrote to memory of 1584 3076 cmd.exe cmd.exe PID 3076 wrote to memory of 1584 3076 cmd.exe cmd.exe PID 3076 wrote to memory of 116 3076 cmd.exe cacls.exe PID 3076 wrote to memory of 116 3076 cmd.exe cacls.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\$_48_\3.vbs"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files\NetMeeting\ie.html" +R2⤵
- Views/modifies file attributes
PID:3660
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Program Files\NetMeeting\ie.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1584
-
-
C:\Windows\system32\cacls.execacls "C:\Program Files\NetMeeting\ie.html" /P Everyone:R3⤵PID:116
-
-