Overview
overview
10Static
static
3671c2e2710...18.exe
windows7-x64
10671c2e2710...18.exe
windows10-2004-x64
10$APPDATA/o...60.dll
windows7-x64
1$APPDATA/o...60.dll
windows10-2004-x64
1$APPDATA/o...60.dll
windows7-x64
1$APPDATA/o...60.dll
windows10-2004-x64
1$APPDATA/o...60.dll
windows7-x64
1$APPDATA/o...60.dll
windows10-2004-x64
1$APPDATA/o...60.dll
windows7-x64
1$APPDATA/o...60.dll
windows10-2004-x64
1$APPDATA/o...Vb.dll
windows7-x64
1$APPDATA/o...Vb.dll
windows10-2004-x64
1$APPDATA/o...nu.dll
windows7-x64
1$APPDATA/o...nu.dll
windows10-2004-x64
1$APPDATA/v...60.dll
windows7-x64
1$APPDATA/v...60.dll
windows10-2004-x64
1$APPDATA/v...UI.dll
windows7-x64
1$APPDATA/v...UI.dll
windows10-2004-x64
1$APPDATA/v...rc.dll
windows7-x64
1$APPDATA/v...rc.dll
windows10-2004-x64
1$APPDATA/v...ui.dll
windows7-x64
1$APPDATA/v...ui.dll
windows10-2004-x64
1$TEMP/Kine...ph.dll
windows7-x64
1$TEMP/Kine...ph.dll
windows10-2004-x64
1$TEMP/boondocks.exe
windows7-x64
3$TEMP/boondocks.exe
windows10-2004-x64
10$TEMP/cust...60.dll
windows7-x64
1$TEMP/cust...60.dll
windows10-2004-x64
1$TEMP/cust...re.dll
windows7-x64
1$TEMP/cust...re.dll
windows10-2004-x64
1$TEMP/cust...UI.dll
windows7-x64
1$TEMP/cust...UI.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
671c2e2710c301a026919308026c7865_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
671c2e2710c301a026919308026c7865_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$APPDATA/operations/21.opends60.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$APPDATA/operations/21.opends60.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$APPDATA/operations/31.opends60.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$APPDATA/operations/31.opends60.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$APPDATA/operations/32.opends60.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$APPDATA/operations/32.opends60.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$APPDATA/operations/63.opends60.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$APPDATA/operations/63.opends60.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$APPDATA/operations/MicrosoftVsaVb.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$APPDATA/operations/MicrosoftVsaVb.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$APPDATA/operations/vbamnu.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$APPDATA/operations/vbamnu.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$APPDATA/var/decoder/3.opends60.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
$APPDATA/var/decoder/3.opends60.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$APPDATA/var/decoder/VB7TLDUI.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$APPDATA/var/decoder/VB7TLDUI.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
$APPDATA/var/decoder/msdatasrc.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$APPDATA/var/decoder/msdatasrc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$APPDATA/var/decoder/msdnmui.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$APPDATA/var/decoder/msdnmui.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$TEMP/Kinematograph.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
$TEMP/Kinematograph.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
$TEMP/boondocks.exe
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
$TEMP/boondocks.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$TEMP/customcode/67.opends60.dll
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
$TEMP/customcode/67.opends60.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$TEMP/customcode/Culture.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
$TEMP/customcode/Culture.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
$TEMP/customcode/MicrosoftDataConnectionUI.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$TEMP/customcode/MicrosoftDataConnectionUI.dll
Resource
win10v2004-20240426-en
General
-
Target
$TEMP/boondocks.exe
-
Size
48KB
-
MD5
f2c010efa41b7f7964f3f7c33d274d2c
-
SHA1
0fa34299cf3cae1f97ce61616481b268fc2d61a4
-
SHA256
1c79fad4da54e50dc05a2ef8b04e650e02dd9e42188aadfd834e64e85c693af0
-
SHA512
722a515ebbba7d381b3630f4696352377274a02e804e465900eaad32099c57ce89fb9703444372ac5c97f75ca387e906cd51000ed3aa1fa85606024e41eac3ae
-
SSDEEP
768:I+R6xxPZE++fy7Hm9qkYonPWvbD+z4Et7:ie+C9q0nPZ9t7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
boondocks.exepid process 2844 boondocks.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
boondocks.exepid process 2844 boondocks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
boondocks.execmd.exedescription pid process target process PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2844 wrote to memory of 2580 2844 boondocks.exe cmd.exe PID 2580 wrote to memory of 2256 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2256 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2256 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2256 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2640 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2640 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2640 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2640 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 112 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 112 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 112 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 112 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2824 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2824 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2824 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 2824 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1492 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1492 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1492 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1492 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1552 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1552 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1552 2580 cmd.exe cmd.exe PID 2580 wrote to memory of 1552 2580 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\boondocks.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\boondocks.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\cmmon32.exe""3⤵PID:2256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\cmmon32.exe""3⤵PID:2640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\cmmon32.exe""3⤵PID:112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\cmmon32.exe""3⤵PID:2824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\cmmon32.exe""3⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "COPY /Y /B "" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\cmmon32.exe""3⤵PID:1552
-
-