Overview
overview
10Static
static
341c38b28a9...18.exe
windows7-x64
1041c38b28a9...18.exe
windows10-2004-x64
10$1/Outbrea...39.exe
windows7-x64
9$1/Outbrea...39.exe
windows10-2004-x64
9$1/Softwar...95.exe
windows7-x64
10$1/Softwar...95.exe
windows10-2004-x64
10$1/Softwar...84.exe
windows7-x64
9$1/Softwar...84.exe
windows10-2004-x64
9$1/Softwar...re.exe
windows7-x64
$1/Softwar...re.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41c38b28a965f10261a320ec88c7adc0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$1/Outbreak/Pigeon_39.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$1/Software/Crew_95.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$1/Software/Crew_95.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$1/Software/Glad_84.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$1/Software/Glad_84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$1/Software/software.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$1/Software/software.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$1/Software/Glad_84.exe
-
Size
4.5MB
-
MD5
0881095412775a91dcaab9b0ff5325e4
-
SHA1
6b8001b963c6120ebfbc303f9d9e42eb7b935dba
-
SHA256
a801f1c92530887b30c21fcd5fbfe284446a918441a9ba62bb98ff23772e470d
-
SHA512
0111e64ef2b1b133f0da60e2e9885a4bc65f4c5f43cc01abe664cc4ff9202f94fc581943b27fd967076ae9d3ebe965a0a0c06842d725649bc8536f7c4d8ff521
-
SSDEEP
98304:ViaFZ3PhLv71Y0e76VOqPJonYVvXCo2MahOY/FYkloKVUcNW9nTBqTTbm6EHo:ViaFZfdv60dVOpna/GFbKrcNWNBqTTb1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Glad_84.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Glad_84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Glad_84.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Glad_84.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine Glad_84.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral8/memory/1480-3-0x00000000008D0000-0x0000000001347000-memory.dmp autoit_exe behavioral8/memory/1480-4-0x00000000008D0000-0x0000000001347000-memory.dmp autoit_exe behavioral8/memory/1480-5-0x00000000008D0000-0x0000000001347000-memory.dmp autoit_exe behavioral8/memory/1480-8-0x00000000008D0000-0x0000000001347000-memory.dmp autoit_exe behavioral8/memory/1480-11-0x00000000008D0000-0x0000000001347000-memory.dmp autoit_exe behavioral8/memory/1480-13-0x00000000008D0000-0x0000000001347000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1480 Glad_84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3048 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1480 Glad_84.exe 1480 Glad_84.exe 1480 Glad_84.exe 1480 Glad_84.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1480 Glad_84.exe 1480 Glad_84.exe 1480 Glad_84.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1480 Glad_84.exe 1480 Glad_84.exe 1480 Glad_84.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1480 wrote to memory of 516 1480 Glad_84.exe 91 PID 1480 wrote to memory of 516 1480 Glad_84.exe 91 PID 1480 wrote to memory of 516 1480 Glad_84.exe 91 PID 1480 wrote to memory of 3672 1480 Glad_84.exe 93 PID 1480 wrote to memory of 3672 1480 Glad_84.exe 93 PID 1480 wrote to memory of 3672 1480 Glad_84.exe 93 PID 1480 wrote to memory of 1632 1480 Glad_84.exe 95 PID 1480 wrote to memory of 1632 1480 Glad_84.exe 95 PID 1480 wrote to memory of 1632 1480 Glad_84.exe 95 PID 1480 wrote to memory of 1572 1480 Glad_84.exe 97 PID 1480 wrote to memory of 1572 1480 Glad_84.exe 97 PID 1480 wrote to memory of 1572 1480 Glad_84.exe 97 PID 1572 wrote to memory of 3048 1572 cmd.exe 99 PID 1572 wrote to memory of 3048 1572 cmd.exe 99 PID 1572 wrote to memory of 3048 1572 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\$1\Software\Glad_84.exe"C:\Users\Admin\AppData\Local\Temp\$1\Software\Glad_84.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc install MicrosoftDefenderBackup C:\ProgramData\Microsoft\MicrosoftDefender\WUDHost.exe2⤵PID:516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc start MicrosoftDefenderBackup2⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd C:\ProgramData\Microsoft\MicrosoftDefender && mwc set MicrosoftDefenderBackup start SERVICE_AUTO_START && mwc start MicrosoftDefenderBackup2⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 localhost < nul & del /F /Q "C:\Users\Admin\AppData\Local\Temp\$1\Software\Glad_84.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:3048
-
-