Overview
overview
7Static
static
7edf693864b...18.exe
windows7-x64
7edf693864b...18.exe
windows10-2004-x64
7$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPImg/C...04.exe
windows7-x64
1$TEMPImg/C...04.exe
windows10-2004-x64
1$TEMPImg/regver.exe
windows7-x64
1$TEMPImg/regver.exe
windows10-2004-x64
1ImageResizerBatch.exe
windows7-x64
7ImageResizerBatch.exe
windows10-2004-x64
7Uninst.exe
windows7-x64
7Uninst.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 17:26
Behavioral task
behavioral1
Sample
edf693864be0bedab974fefb090d9a20_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edf693864be0bedab974fefb090d9a20_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$TEMPImg/CheckVer104.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$TEMPImg/CheckVer104.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$TEMPImg/regver.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMPImg/regver.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
ImageResizerBatch.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
ImageResizerBatch.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
Uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Uninst.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240226-en
General
-
Target
ImageResizerBatch.exe
-
Size
357KB
-
MD5
df6e28ad3f8614e059abf4c77d8650ab
-
SHA1
891bd6eb066f12ec56118312e30a0eeb56b0b656
-
SHA256
086ae468204b451e9b658144642617c57bb40b8b9aaa06b869d6e1aff58fd872
-
SHA512
7cac95a134c80d2f7aee584e760b9064f319c5fcf6acc93d226497514608c935587fcec7a519b5b4b10a6579eab545051645b233ca0f73ea9edbcf0c40d33693
-
SSDEEP
6144:c8yZw0EMTNHw7Ip+rKUEqpjyfe03qJf1zw4T/+8zXTfwcDKl+oSUl:VZ0btw6+rK5qkfe03j4j+cD4choSo
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/2288-0-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral12/memory/2288-12-0x0000000000400000-0x000000000050A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 ImageResizerBatch.exe 2288 ImageResizerBatch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ImageResizerBatch.exe"C:\Users\Admin\AppData\Local\Temp\ImageResizerBatch.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3464 --field-trial-handle=2268,i,4334050275411101233,11484630688883830558,262144 --variations-seed-version /prefetch:81⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b3c8795599cb427188795d6b1fd65d71
SHA118cc8786c8c3a54a5783c90852ee0f782347ce36
SHA2561c26f95b09f6ff474fdeb2e49951bdbac47f6f5ed01f9f2362d5226cf49e3690
SHA512ffcba9fed93540a872b8b10d582f4a932ac6f5d7bb3e80c6ab102f9a35c52b75ff49c2ad049982ef540578baf26da85515f6cf5a9a0a25ce307c5de2a29a1da4