Overview
overview
7Static
static
36dfb490d34...18.exe
windows7-x64
76dfb490d34...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3Help.chm
windows7-x64
1Help.chm
windows10-2004-x64
1Right Clic...er.exe
windows7-x64
1Right Clic...er.exe
windows10-2004-x64
1Tools/File...or.exe
windows7-x64
1Tools/File...or.exe
windows10-2004-x64
1Tools/File...lp.chm
windows7-x64
1Tools/File...lp.chm
windows10-2004-x64
1Tools/New ...lp.chm
windows7-x64
1Tools/New ...lp.chm
windows10-2004-x64
1Tools/New ...or.exe
windows7-x64
1Tools/New ...or.exe
windows10-2004-x64
1Tools/Righ...lp.chm
windows7-x64
1Tools/Righ...lp.chm
windows10-2004-x64
1Tools/Righ...IE.exe
windows7-x64
1Tools/Righ...IE.exe
windows10-2004-x64
1Tools/Righ...lp.chm
windows7-x64
1Tools/Righ...lp.chm
windows10-2004-x64
1Tools/Righ...er.exe
windows7-x64
1Tools/Righ...er.exe
windows10-2004-x64
1Tools/Righ...32.dll
windows7-x64
1Tools/Righ...32.dll
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
6dfb490d34058e5e8f42d327660afce2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6dfb490d34058e5e8f42d327660afce2_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DotNetChecker.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DotNetChecker.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Help.chm
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Right Click Enhancer.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Right Click Enhancer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Tools/File Types Editor/File Types Editor.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
Tools/File Types Editor/File Types Editor.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Tools/File Types Editor/Help.chm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Tools/File Types Editor/Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Tools/New Menu Editor/Help.chm
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Tools/New Menu Editor/Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Tools/New Menu Editor/New Menu Editor.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Tools/New Menu Editor/New Menu Editor.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
Tools/Right Click Editor IE/Help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Tools/Right Click Editor IE/Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Tools/Right Click Editor IE/Right Click Editor IE.exe
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
Tools/Right Click Editor IE/Right Click Editor IE.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Tools/Right Click Tweaker/Help.chm
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
Tools/Right Click Tweaker/Help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Tools/Right Click Tweaker/Right Click Tweaker.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Tools/Right Click Tweaker/Right Click Tweaker.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Tools/Right Click Tweaker/Tools/ContextConsole Shell Extension/CmdOpen_32.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Tools/Right Click Tweaker/Tools/ContextConsole Shell Extension/CmdOpen_32.dll
Resource
win10v2004-20240426-en
General
-
Target
Right Click Enhancer.exe
-
Size
830KB
-
MD5
bd07d69edbc4779b65f837798cfce2d5
-
SHA1
002a487831267ef2bfb6e4a312690ff3be1181e0
-
SHA256
319433db5c3a38d2a5641fcb0e66874deb3b3eb8ec93ce5123bda06f77f165f5
-
SHA512
2b0732d23a060e1e0a4c617c147027cbdaea235d383b830e99be93583c3dace0d98d2e32f7aff712715d9bfa9ff375863e158eb6b18fe162e828da7bb5fc5ad7
-
SSDEEP
6144:Xl5nQMLV6yW76jThLN2haW6y8gGmycDC+yvqaSXKW7R57BOKHkss7aTuiz/wzT6W:XnQPd6jTdNs/QKtiiUz/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 3884 2780 Right Click Enhancer.exe 86 PID 2780 wrote to memory of 3884 2780 Right Click Enhancer.exe 86 PID 3884 wrote to memory of 5048 3884 csc.exe 88 PID 3884 wrote to memory of 5048 3884 csc.exe 88 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Right Click Enhancer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Right Click Enhancer.exe"C:\Users\Admin\AppData\Local\Temp\Right Click Enhancer.exe"1⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2780 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\igpdhjrg\igpdhjrg.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES545A.tmp" "c:\Users\Admin\AppData\Local\Temp\igpdhjrg\CSCD052CE0DB41C494C94E031E74C148D7C.TMP"3⤵PID:5048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD54947ce53d960accc0bd807dfec508098
SHA1ed5fae18b48abfe03055dad03c7c6961a7090ec2
SHA2563a2de65263ce406b57adf92c7a70a8f6719bee43d2644fcc988cc4dc16ec1fe8
SHA512503eaee029a4b879c03903873ec5a05f295535e5041ad7f22a1504ac6c98b3259d729c3406ea4c4aa6dfeb532008b2098bb1d5840b44cefc361ca4de4b0c32dc
-
Filesize
26KB
MD5bff23d834ece5591a51d0019e7134f5e
SHA1a77f17537c4dcf9fd42a5efb7a4e92349368fa35
SHA256a1edec95452f32ea1149b0f0c4d8ec16bd9affde1c448c06efa8af179d00715f
SHA5121d1ca50d272596da767383b9637b6297522bb03ac3928c6d73c99f753044c0720c0dadb9f3610b450dd54a0b7768e9255b3379621a588a3ff3e5d23941240d04
-
Filesize
44KB
MD54810d5c121e9ed033df89387f7ce9f50
SHA17b08ac2b56fd6355d2c7934bac863a0cd39d95f2
SHA256edf332d48066b8b2eb852b8b8d899ee73cc48c82e87a235a3b7ca73fcbdae220
SHA512608b8343b685876a3f0d78727ed0f1c581faac9f9a3c648e9f4c45dd9b80f1d6810600c23787fcd82761f2f937615b0cca121b35920d4e9a2c9b38a2861c881f
-
Filesize
1KB
MD5aca9aa0ff2661f4d8ab586eb43740f2f
SHA17fa243211a68eaed92e681313a29b7e01760b5c8
SHA2567796722954ac18245a435c7a0cdd51f50c929d9a510e91e871e10f6c3e4add2b
SHA5120a4090313f681e11e4f3397e94a1878fa4814d781ece1d2720a6ed6f7b27069b5fb551caa9c0bafeabfec783fcd8ccc03cafebce62cc856fe81ff2b1b0b100e7
-
Filesize
8KB
MD582e3b06e74805bcbeaa503ca42b11e80
SHA1725a0293c1b2acd73058965a3b26a7803c32a63b
SHA25683bda3f77cd6fd3cbdd78a99c2c8bf1a618cebc34adba945ad21c8d95247eea2
SHA51277914706ee8520114b72e98d33d415cfdddb3d0f12e95692a7fca5016e08ca25b201cde9e075cc344e6aeb687e9744ad86147a800159191d37a75662ebdee7ff
-
Filesize
652B
MD555cecbd123a8c7faf13b1b7e41428073
SHA174c037a4cbb786dac83cc494fb7d0257051f05aa
SHA2566246f03a59dc8bf4afb78a787be513fde1d6f04fe6b83487f2c0892209ad8149
SHA5129062bcc4e82a08dd010d73bbc4aba18e0e21b5f5382f6eb7c313f265f50d232122d21217d079f12ebc229305e5d709f672d32cebb89cbe070490431f1e435527
-
Filesize
15KB
MD55386c7e1be6533fa552a6e00abe27f77
SHA19f5de4c9068e01e76b1436ddc770846b74a20652
SHA2566338e1298ba0b35be7359d845d168cb98bea0903ff1ab046dae5b686aafedaab
SHA5124d51889368b34eafe886a26a80298c6aae4197008ac26ccaea97e54a6e2367a1a1182316583d95dc130c2eac9ff6cc41c22f289bc5567f7ae933e2c292f929a1
-
Filesize
1KB
MD5b32af1f2e7a57a82b3be1f1706e328ac
SHA11d341a241b5f02bd14ba0ae45d4eff0cf51235b3
SHA256f62a5ab2d82ffe6b94c6b96b7e6c025bc76004bbfa4a0a97b395091a1dc6bac5
SHA5125769aa10b0f9f731d84a37ba6dc6c66e19ab9eb4f1a7fce6cc107797515e9ed4fb828e32ec99cb72f86592c90ec74084a74f814bb5f029c3f80d0f64f3e08ef8