Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 01:36

General

  • Target

    fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe

  • Size

    125KB

  • MD5

    fba356748c02da7a65ddef9470aa1cf2

  • SHA1

    e0e3b538d015b1eb06a8a663bc746a36c3cc5848

  • SHA256

    792eba5ba91a52bfb3b369107f38fb9a7e7b7987cd870f465338eae59e81f3f6

  • SHA512

    f626824b33ea03f690500058c73ba662a1363535f80e7b05149dc8b580bd6bf514b334f3509283933993d0947b254c30cb6ddbf7be99d53de471997a2ef2f71d

  • SSDEEP

    3072:DQIURTXJ+MSx7NqlTE6jSOJH9deWpA9+MlScvohy8oAYS0tzgv:Ds9Sx7NqRz9In+Ml1vob6dtK

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\arpa.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\arpa.exe
        "C:\Users\Admin\AppData\Local\Temp\arpa.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3456
        • C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe
          "C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ESET Malware ProtectionLYo\http_dll.dat

    Filesize

    81KB

    MD5

    27a4ed145a9a6cb41af09b8927fd5bee

    SHA1

    815be32e1ae7ec20621e87239a6279fbba2fc8b5

    SHA256

    3fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10

    SHA512

    2978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8

  • C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe

    Filesize

    95KB

    MD5

    28c6f235946fd694d2634c7a2f24c1ba

    SHA1

    e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5

    SHA256

    c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763

    SHA512

    16865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be

  • C:\Users\Admin\AppData\Local\Temp\http_dll.dll

    Filesize

    20KB

    MD5

    5b92266d9a26260b4c9920ede267ba37

    SHA1

    372d5455fdb689787e7e49f7799510c6c2cdf6b7

    SHA256

    d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261

    SHA512

    db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5

  • memory/1368-23-0x0000000000800000-0x0000000000900000-memory.dmp

    Filesize

    1024KB

  • memory/1368-22-0x00000000022A0000-0x00000000022C0000-memory.dmp

    Filesize

    128KB

  • memory/1368-24-0x0000000000800000-0x0000000000900000-memory.dmp

    Filesize

    1024KB

  • memory/3456-14-0x0000000000FE0000-0x00000000010E0000-memory.dmp

    Filesize

    1024KB

  • memory/3456-10-0x0000000002A00000-0x0000000002A20000-memory.dmp

    Filesize

    128KB