Overview
overview
7Static
static
78df1aa737b...18.exe
windows7-x64
48df1aa737b...18.exe
windows10-2004-x64
4$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$_4_/TeamViewer_.exe
windows7-x64
7$_4_/TeamViewer_.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...rb.dll
windows7-x64
3$PLUGINSDI...rb.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 11:37
Behavioral task
behavioral1
Sample
8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$_4_/TeamViewer_.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$_4_/TeamViewer_.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InvokeShellVerb.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InvokeShellVerb.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/dialogsEx.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/dialogsEx.dll
Resource
win10v2004-20240508-en
General
-
Target
8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe
-
Size
21.8MB
-
MD5
8df1aa737b8c6c4ea21a6578057af930
-
SHA1
4f09fbe15329843b0000009255c82d2eb7124157
-
SHA256
0d1a6735e5f1522903ff8e5c48fbad41b556cdfa796b836a03071fa15a9c57ff
-
SHA512
dcda3fa4002719b09d328e2c68718adbbb2267e815ea2a6b864f4161f51a8f229ef108bf56a52c4f8e078c7bccaf27c18089b83a86805b816de568a40f37b1a4
-
SSDEEP
393216:FAjMwMg1BIXOuljaia3hs5nnIzPqPvdPUkGVyXOWUSOCRhNjjgMO3tKu:ijMwV1xEeia3u5IzPqhNGUXOWdRhNnNQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2600 TeamViewer_.exe -
Loads dropped DLL 15 IoCs
pid Process 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 TeamViewer_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28 PID 1932 wrote to memory of 2600 1932 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD500d0b831bcd4f7db87768f618270fb02
SHA1e5f69a70661644ee27a6fa0d215f8a5263282417
SHA256b8d53ae825fa56dd7b8cdea0484a4d98ea8ca15f88a511c74833288081c1c2db
SHA512fe5ac6973fffd32fc17ab4afdb375ed8e5fc2bddba7dc47dde4b58361afbd333faaaf018d03c4c7fe7ecf3c1f74cb452c30d18b2a6c0012c3ec95f3c54116a78
-
Filesize
193KB
MD5d2ac4ca57f4b624c444c17e8a353deaa
SHA1d713b2b4ff0cec01b5c89bd26127012eed460a32
SHA256a4db659c6265ba7efbbd4906257ef6cdb8f9b1fefba78f01425390729ab3d1f2
SHA512db991671548d9f239acf7b77b47ccbf438c626e803026a68d7c67ec5b3923195c8745f6adbe730fe4c049237217849f8f9f47fc335cf94b1413a7debc9b8d9b1
-
Filesize
1KB
MD5f68824a4130ebaf6bc7ab0f62256d7d7
SHA140af19a0d92b3c9e1a8b1eaab7d12c69e5df436a
SHA256cd8149a2e89373075ee6db800b7f2496bacbfe21b23e4a06a3453632503b3965
SHA5126a173aaa183be0e5a516cad484802dae1fc53a414f870f93ea846a9ef9f9df35153766ef632eb5e8ced8f94c2ed09a9decdf3465d46b0dcc44a6918d88e242cb
-
Filesize
2KB
MD554e585a4f7b14f8048658040d873cfba
SHA176f281b9e67c8d2da27d91db7813dca10d6c9347
SHA2564f6186ee23381e783a5b5b9445bba689f56696e8e5eae7286e8af77f0a098be0
SHA512830f4d977b5e5fb582b2c592900a0986ed9c802c9fa1b5d7c74ca6922a73cca7c14dc74d0fcc851084b8385849b4457375a262dd3c50edcaf72ff7065fa637a1
-
Filesize
2KB
MD52a8a139cdab38b5f4264ae82850cbd22
SHA1816e8acb2adc36c7f138f963a9802622dfc9536a
SHA25694bde605292510f8ae6df19083130770ae8c754906007ea93150cab63962190b
SHA512d6f99e88e72cfb28afc4af0780d2ac380f00f9fe9265cbbb4b8e6390e9b6ee5870a723e1971288783fd919158659ff214bab383242fa22470d9f6f1a170e2cf1
-
Filesize
21.1MB
MD567a3aba3d9d1b3c06f7d29f88462f905
SHA19cad747d67a8f87086207f443a7f1083ae922ea4
SHA25641e3451fa7dcec308581ed259849523a9f8cc5d022290c14a70f632ec55208ba
SHA512b29c1be4025aced75b6dda309b69370403ec6a16f0bd0368bd9011cc86c23db01e438fa3c7dcbe3b877478f0527c11e0b553a5cf2a4158be9ff8687110ec99bf
-
Filesize
15KB
MD5033ee34c40e8fa85bf2739bcb2f3e186
SHA12ca942f35f77f37df3fc6097acac34f2e77341b7
SHA256c91c1796338a265b49039c0b2c7a312d764b99e5174fb2dae455ca54f8f41ec7
SHA5122204e0b8721b8d85c51bd068b1695b16ee096bfc1d1cd5843f48fd04032aeee2b6a91ce82978a4b3414f3d966ec5b36fb337a4149dae3a1d0445935d964d247f
-
Filesize
11KB
MD50ff2d70cfdc8095ea99ca2dabbec3cd7
SHA110c51496d37cecd0e8a503a5a9bb2329d9b38116
SHA256982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b
SHA512cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e
-
Filesize
210KB
MD505f51bc8ffb2c8f5a2825bf5680301cf
SHA130f7f77dce1fb3526142780e9f5bd5c11622d6b6
SHA256c67cbd5e35e1ce0c7ba17c55d8e2bc33afd5e0a68774554a1fe7216d330c709e
SHA5121e041aaa37dd00414ad955ebc8c0f708589014d2085a5a0b95a31f4d694bb1cc4994bb1324d4b983cbad0449fb0a05560d82c60fdbfc78be67ff61275e451233
-
Filesize
4KB
MD59b0db6a6056e8e51ac35e602aeab769f
SHA1b541c6d2635141cdc3a74f59d55db8df4a92e7ac
SHA256925d80c31702a95d58ede91ee97fd842de78ca6dde69156a6c1a755fba93cd5c
SHA51283fe9d346835940a37e0e0a18d041c9d13fc95a0e9ece3bc18e555cf0e8e7ddf7b42dba422b1e55ace31db3c9fc807e0b44e93b8f07f5acb943eaaf77b4f0ac6
-
Filesize
45KB
MD54ac3f0ab2e423515ed9c575333342054
SHA1a3e4f2b2135157f964d471564044b023a64f2532
SHA256f223d6c72f86544b358a6301daf60ccdd86198f32e3447a1860acf3f59f2dae9
SHA5128fbd5b4989be51c27fa15af155d2921bea9aa5d0557a22d4224256e678dfe7dcaa5f80917a748c31dc9c9a91573e4618e2497ccfd47eefd7a0fa08c12366a1e5