Overview
overview
8Static
static
3f8420cad98...18.exe
windows7-x64
8f8420cad98...18.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1fr.exe
windows7-x64
7fr.exe
windows10-2004-x64
7pn.exe
windows7-x64
8pn.exe
windows10-2004-x64
8Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8420cad9886537d355d8f2712a7c8da_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20240319-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
fr.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
fr.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
pn.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
pn.exe
Resource
win10v2004-20240412-en
General
-
Target
pn.exe
-
Size
965KB
-
MD5
2e59df57056cb7265bf9a9906a82e9b5
-
SHA1
6b473b2d49de1e9a27b6bb16e911cafe560d006c
-
SHA256
582a359a06d6306eaf4b289f284a6c7da778484aeb1a0690c55c815e1c07a1ee
-
SHA512
2ee3c1f2ad61d2266e22f2425766a5aec3fd10cc768e5bfd35115bd45f26edb3dda0fa89708324652baa24df75694d4acd7d2e751d9894611dde37a5d1b3d53b
-
SSDEEP
12288:vJX4v0P5DOTwK/qOhY5WAqvWL6oQKaDCaTy0E9k10zotnHh83dWKh3AT0E5D:vBX9+Kf6jKauaTZMiHhqWKZA
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 34 4844 WScript.exe 36 4844 WScript.exe 38 4844 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation Esistenza.exe.com -
Executes dropped EXE 2 IoCs
pid Process 2780 Esistenza.exe.com 2960 Esistenza.exe.com -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" pn.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 iplogger.org 33 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Esistenza.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Esistenza.exe.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings Esistenza.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4956 PING.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2780 Esistenza.exe.com 2780 Esistenza.exe.com 2780 Esistenza.exe.com 2960 Esistenza.exe.com 2960 Esistenza.exe.com 2960 Esistenza.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2780 Esistenza.exe.com 2780 Esistenza.exe.com 2780 Esistenza.exe.com 2960 Esistenza.exe.com 2960 Esistenza.exe.com 2960 Esistenza.exe.com -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4156 3632 pn.exe 83 PID 3632 wrote to memory of 4156 3632 pn.exe 83 PID 3632 wrote to memory of 4156 3632 pn.exe 83 PID 3632 wrote to memory of 616 3632 pn.exe 84 PID 3632 wrote to memory of 616 3632 pn.exe 84 PID 3632 wrote to memory of 616 3632 pn.exe 84 PID 616 wrote to memory of 2196 616 cmd.exe 86 PID 616 wrote to memory of 2196 616 cmd.exe 86 PID 616 wrote to memory of 2196 616 cmd.exe 86 PID 2196 wrote to memory of 1820 2196 cmd.exe 87 PID 2196 wrote to memory of 1820 2196 cmd.exe 87 PID 2196 wrote to memory of 1820 2196 cmd.exe 87 PID 2196 wrote to memory of 2780 2196 cmd.exe 88 PID 2196 wrote to memory of 2780 2196 cmd.exe 88 PID 2196 wrote to memory of 2780 2196 cmd.exe 88 PID 2196 wrote to memory of 4956 2196 cmd.exe 89 PID 2196 wrote to memory of 4956 2196 cmd.exe 89 PID 2196 wrote to memory of 4956 2196 cmd.exe 89 PID 2780 wrote to memory of 2960 2780 Esistenza.exe.com 90 PID 2780 wrote to memory of 2960 2780 Esistenza.exe.com 90 PID 2780 wrote to memory of 2960 2780 Esistenza.exe.com 90 PID 2960 wrote to memory of 4844 2960 Esistenza.exe.com 94 PID 2960 wrote to memory of 4844 2960 Esistenza.exe.com 94 PID 2960 wrote to memory of 4844 2960 Esistenza.exe.com 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\pn.exe"C:\Users\Admin\AppData\Local\Temp\pn.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Ora.tif2⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^riubUwhJVBcAWxPbDOSEYgKBaLKelDDKVoOIIXjPsUNHnzwOpkOcJtQPbFyodknaYLENFuOFCehtBeeYKVTZOiqQaZkrRrnucxJNOhoevoTGRLhxDunxsmDQKNcGULNnEuIuzg$" Poi.tif4⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.comEsistenza.exe.com Z4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.com Z5⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pojrodfwwep.vbs"6⤵
- Blocklisted process makes network request
PID:4844
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 304⤵
- Runs ping.exe
PID:4956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD5bd0c2d8e6b0fe0de4a3869c02ee43a85
SHA121d8cca90ea489f88c2953156e6c3dec6945388b
SHA2563a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533
SHA512496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6
-
Filesize
139KB
MD5f0b4f2be629c1200116f93db3cdf0868
SHA1497ec65d2fd55e5e55a512276aa44d606b30e3df
SHA25695c72f4f5e0b834a0aedcfd804dce6fa3f9d178756ead9015e15acee9f30c8de
SHA512f77f38247952d6f21f1d5bcc2a203e9d3ca1d4df2b57c0067baae1e16439fbed6434a93be04fdfa405043d7b7300a4ee99d26ef8b73d26f5b359151acdebbb00
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
520B
MD52b01aacb646ebfc44f2e1e479735fda8
SHA1a86a3a3029b63b758b641812d9293dcb7a264981
SHA2567847fb21cff01ce0a99eaeae0d46d48bd39d556bdfcc46ba7cd9906de0c2a420
SHA512859333f012b37649fafc0c4318de30f5e5e1002b1a575ce9d197444f3682ba817e1e151d8aba1608a23946f0adae10431926ba8e60301fbeb5df7b4cd6724b5a
-
Filesize
697KB
MD5eb38b72baef5c44e96f939c9f0909256
SHA1e2b0dadd14ac172b5a42cb51428f4c70d2bcbedc
SHA256f49efb6f2d8f46ee1bb971450e930f2018668cda103338abfbf16f3b806afb87
SHA5125f0cb16966c20841c33e7c20311fa01b7247b42659c30a432783ff133dbf3e8da417708c4b7822a3b171ed9a5128574112c5a28de3c9104ef9d105264768fc9a
-
Filesize
872KB
MD5d5a0a9ee1b5cf11c5c4deb0a3181841e
SHA16f61c6c775c57f7d2fde6ee8dada897996c046c8
SHA2569e84d447e57bd729e500a0a4df6941502fd2a05eb5eca5e7b6d022547d922487
SHA512e0676ac7c72860433fdbfa96201a8fb829a761b204c30cb991672465edac9eb294a535f96bb9f4d5383b246ca6b80c8cf3d9a59127c023a24f818ffd189e40f3
-
Filesize
139B
MD5f04d78f3bf382b7c4dfe34ec4a25550f
SHA1e580a3871fb8fb52abe681aa144b5a8e43abb6f4
SHA2567bfd2ea3a2f9bf23e6c9265b9c4bd2c45ccb6e93db83d373960253b07ff39c3e
SHA51262954dbadda43168110c5d17895b60dc6f69e525ddec4df3c12906cbe4344cbab98e404861c851a8647a05e57c766e92e7bef9155c8fbacf0a19e50ddecba305