Overview
overview
10Static
static
341c38b28a9...18.exe
windows7-x64
1041c38b28a9...18.exe
windows10-2004-x64
10$1/Outbrea...39.exe
windows7-x64
9$1/Outbrea...39.exe
windows10-2004-x64
9$1/Softwar...95.exe
windows7-x64
10$1/Softwar...95.exe
windows10-2004-x64
10$1/Softwar...84.exe
windows7-x64
9$1/Softwar...84.exe
windows10-2004-x64
9$1/Softwar...re.exe
windows7-x64
$1/Softwar...re.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$1/Software/Crew_95.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$1/Software/Crew_95.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$1/Software/Glad_84.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$1/Software/Glad_84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$1/Software/software.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$1/Software/software.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
-
Size
15.8MB
-
MD5
41c38b28a965f10261a320ec88c7adc0
-
SHA1
f633611416eacf26ca20291e672a954a186220cd
-
SHA256
42ca73a2f64b86c9e59cc795eaf28450bdfd1149a35b052e2a8baf1b47e82204
-
SHA512
5b8b7fb27e3f5e904399f8a9a063cfadb5085db0e2f68b0d58a8cd9050896651c4627d393039259b09cfd4fb3cfb1ceef4728e317e18d2ba19bc771399804687
-
SSDEEP
393216:i6eS1UH9VJcP/hDcSWodYkg7S1e1uBFBecboH86C:i6eS1cVJcXcBMiuFBemoH8L
Malware Config
Signatures
-
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule behavioral1/memory/2520-58-0x00000000011B0000-0x0000000001BA8000-memory.dmp family_raccoon_v1 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Pigeon_39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Glad_84.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crew_95.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RealtekSb.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Pigeon_39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Glad_84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Glad_84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crew_95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crew_95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RealtekSb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RealtekSb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Pigeon_39.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RealtekSb.lnk Pigeon_39.exe -
Executes dropped EXE 4 IoCs
pid Process 2744 Pigeon_39.exe 2628 Glad_84.exe 2520 Crew_95.exe 2292 RealtekSb.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine Pigeon_39.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine Glad_84.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine Crew_95.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine RealtekSb.exe -
Loads dropped DLL 9 IoCs
pid Process 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 2520 Crew_95.exe 2520 Crew_95.exe 2520 Crew_95.exe 2744 Pigeon_39.exe 2744 Pigeon_39.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2628-57-0x0000000000220000-0x0000000000C97000-memory.dmp autoit_exe behavioral1/memory/2628-70-0x0000000000220000-0x0000000000C97000-memory.dmp autoit_exe behavioral1/memory/2628-82-0x0000000000220000-0x0000000000C97000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2744 Pigeon_39.exe 2628 Glad_84.exe 2520 Crew_95.exe 2292 RealtekSb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Crew_95.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Crew_95.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1056 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2292 RealtekSb.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2744 Pigeon_39.exe 2628 Glad_84.exe 2520 Crew_95.exe 2292 RealtekSb.exe 2628 Glad_84.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2628 Glad_84.exe 2628 Glad_84.exe 2628 Glad_84.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2628 Glad_84.exe 2628 Glad_84.exe 2628 Glad_84.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2744 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2628 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2628 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2628 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2628 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2520 1368 41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe 30 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2744 wrote to memory of 2292 2744 Pigeon_39.exe 32 PID 2628 wrote to memory of 2260 2628 Glad_84.exe 36 PID 2628 wrote to memory of 2260 2628 Glad_84.exe 36 PID 2628 wrote to memory of 2260 2628 Glad_84.exe 36 PID 2628 wrote to memory of 2260 2628 Glad_84.exe 36 PID 2628 wrote to memory of 2940 2628 Glad_84.exe 38 PID 2628 wrote to memory of 2940 2628 Glad_84.exe 38 PID 2628 wrote to memory of 2940 2628 Glad_84.exe 38 PID 2628 wrote to memory of 2940 2628 Glad_84.exe 38 PID 2628 wrote to memory of 3000 2628 Glad_84.exe 40 PID 2628 wrote to memory of 3000 2628 Glad_84.exe 40 PID 2628 wrote to memory of 3000 2628 Glad_84.exe 40 PID 2628 wrote to memory of 3000 2628 Glad_84.exe 40 PID 2628 wrote to memory of 1900 2628 Glad_84.exe 42 PID 2628 wrote to memory of 1900 2628 Glad_84.exe 42 PID 2628 wrote to memory of 1900 2628 Glad_84.exe 42 PID 2628 wrote to memory of 1900 2628 Glad_84.exe 42 PID 1900 wrote to memory of 1056 1900 cmd.exe 44 PID 1900 wrote to memory of 1056 1900 cmd.exe 44 PID 1900 wrote to memory of 1056 1900 cmd.exe 44 PID 1900 wrote to memory of 1056 1900 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe"C:\Users\Admin\AppData\Roaming\Outbreak\Pigeon_39.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe"C:\Users\Admin\AppData\Roaming\Realtek Sound Blaster\RealtekSb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
-
C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc install MicrosoftDefenderBackup C:\ProgramData\Microsoft\MicrosoftDefender\WUDHost.exe3⤵PID:2260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc start MicrosoftDefenderBackup3⤵PID:2940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc set MicrosoftDefenderBackup start SERVICE_AUTO_START && mwc start MicrosoftDefenderBackup3⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Roaming\Software\Glad_84.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost4⤵
- Runs ping.exe
PID:1056
-
-
-
-
C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe"C:\Users\Admin\AppData\Roaming\Software\Crew_95.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5ef9aa9009c8df44bb806f66b8e367bf7
SHA19fdcbf944c3f6bdabe66d1d8caa058e167baa14b
SHA256459d0ea5dc8c44e62020aff6016cf0a4495e217e1892bda8aaf8f2a9187d4612
SHA51299e744363ac69343a394a13c1c219e9167dbf892150abd0d840f78a0d9566ecb340827d8a67a0d32365eca209c723e3d370a715151be74641dbea2a09e35eac2
-
Filesize
4.5MB
MD50881095412775a91dcaab9b0ff5325e4
SHA16b8001b963c6120ebfbc303f9d9e42eb7b935dba
SHA256a801f1c92530887b30c21fcd5fbfe284446a918441a9ba62bb98ff23772e470d
SHA5120111e64ef2b1b133f0da60e2e9885a4bc65f4c5f43cc01abe664cc4ff9202f94fc581943b27fd967076ae9d3ebe965a0a0c06842d725649bc8536f7c4d8ff521
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
6.8MB
MD5f7958823d5a3c0a2df7974adde4028d0
SHA1bb4e28ce33d1d1346c9916593d2760596eec0cc2
SHA25672a310904f5c29c586eceff7a2442dc50e82c5a0673ac62e07c793333803f0e5
SHA5125d65bf146d76f0d24599e95d6b222125d717bf6a94c58034cb09a96380b92b6a672a54987acebca83ba1f9dc78ab1947fa3c9cc5856f08a0042673b78fcf9171