Overview
overview
8Static
static
3f8420cad98...18.exe
windows7-x64
8f8420cad98...18.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1fr.exe
windows7-x64
7fr.exe
windows10-2004-x64
7pn.exe
windows7-x64
8pn.exe
windows10-2004-x64
8Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20240319-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
fr.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
fr.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
pn.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
pn.exe
Resource
win10v2004-20240412-en
General
-
Target
fr.exe
-
Size
335KB
-
MD5
642c6b02eaaeb1d68a822c14af3f6bab
-
SHA1
1f2eefedb9ad59d046725b20246d10e7462f9813
-
SHA256
b973e7f93d2181b7435107ae5b548c091f79a1cda264899f5d500e44df5489a5
-
SHA512
0dc14379ef493020286ae40d906b3f2c905e3a99113b530451b12209a6357c178a89598ae0535cfdc6b3f17ae15daa2a791dea76acb9685661b170740a0ca1f1
-
SSDEEP
6144:Ig6O9ZgZcxDjl1+hcBkGLkdw8KYNqyIWdXqjphplvMmyejD9woDx2ntO12Q:IIZgWVChc2G0wzsq9gX2PUXe/9vDxKtY
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk fr.exe -
Executes dropped EXE 1 IoCs
pid Process 2148 SmartClock.exe -
Loads dropped DLL 3 IoCs
pid Process 2868 fr.exe 2868 fr.exe 2868 fr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2148 SmartClock.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2148 2868 fr.exe 28 PID 2868 wrote to memory of 2148 2868 fr.exe 28 PID 2868 wrote to memory of 2148 2868 fr.exe 28 PID 2868 wrote to memory of 2148 2868 fr.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fr.exe"C:\Users\Admin\AppData\Local\Temp\fr.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD5642c6b02eaaeb1d68a822c14af3f6bab
SHA11f2eefedb9ad59d046725b20246d10e7462f9813
SHA256b973e7f93d2181b7435107ae5b548c091f79a1cda264899f5d500e44df5489a5
SHA5120dc14379ef493020286ae40d906b3f2c905e3a99113b530451b12209a6357c178a89598ae0535cfdc6b3f17ae15daa2a791dea76acb9685661b170740a0ca1f1