Overview
overview
10Static
static
10ed03f8136c...18.exe
windows7-x64
7ed03f8136c...18.exe
windows10-2004-x64
7$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
7$PLUGINSDI...om.dll
windows10-2004-x64
7$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$TEMP/v.vbs
windows7-x64
3$TEMP/v.vbs
windows10-2004-x64
3$TEMP/xcmd.exe
windows7-x64
9$TEMP/xcmd.exe
windows10-2004-x64
9$_48_/$APP...md.exe
windows7-x64
9$_48_/$APP...md.exe
windows10-2004-x64
9$_48_/1.html
windows7-x64
6$_48_/1.html
windows10-2004-x64
1$_48_/3.bat
windows7-x64
1$_48_/3.bat
windows10-2004-x64
1$_48_/3.vbs
windows7-x64
4$_48_/3.vbs
windows10-2004-x64
7$_48_/qq.vbs
windows7-x64
3$_48_/qq.vbs
windows10-2004-x64
7Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 08:42
Behavioral task
behavioral1
Sample
ed03f8136c974575f1995a02588027fd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed03f8136c974575f1995a02588027fd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MakeDll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$TEMP/v.vbs
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/v.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$TEMP/xcmd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$TEMP/xcmd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$_48_/$APPDATA/xcmd.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$_48_/$APPDATA/xcmd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$_48_/1.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
$_48_/1.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$_48_/3.bat
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$_48_/3.bat
Resource
win10v2004-20240319-en
Behavioral task
behavioral29
Sample
$_48_/3.vbs
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$_48_/3.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$_48_/qq.vbs
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$_48_/qq.vbs
Resource
win10v2004-20240226-en
General
-
Target
$_48_/qq.vbs
-
Size
1KB
-
MD5
fb8a0c0af287b4b015369b5e756d2bb2
-
SHA1
6d2f48d51f5b01e4d5e852b1652c79098fb92a7a
-
SHA256
9ad1f7f062cb13e077fffd5a0642a46feffb17ad89415cc6365f9a012ded5fc4
-
SHA512
35b59fb0c8b5a70ec32cb69e561e0559644f2a3d19caa28387891fcd6be6ec35781a760ab3f84cc4c9fef2b61cbcb57692e67971c18c8fdfca18fe169502651a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 1372 wrote to memory of 4032 1372 WScript.exe attrib.exe PID 1372 wrote to memory of 4032 1372 WScript.exe attrib.exe PID 1372 wrote to memory of 2340 1372 WScript.exe cmd.exe PID 1372 wrote to memory of 2340 1372 WScript.exe cmd.exe PID 2340 wrote to memory of 4700 2340 cmd.exe cmd.exe PID 2340 wrote to memory of 4700 2340 cmd.exe cmd.exe PID 2340 wrote to memory of 3980 2340 cmd.exe cacls.exe PID 2340 wrote to memory of 3980 2340 cmd.exe cacls.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\$_48_\qq.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files\NetMeeting\ie.html" +R2⤵
- Views/modifies file attributes
PID:4032
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Program Files\NetMeeting\ie.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4700
-
-
C:\Windows\system32\cacls.execacls "C:\Program Files\NetMeeting\ie.html" /P Everyone:R3⤵PID:3980
-
-