Overview
overview
7Static
static
78df1aa737b...18.exe
windows7-x64
48df1aa737b...18.exe
windows10-2004-x64
4$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$_4_/TeamViewer_.exe
windows7-x64
7$_4_/TeamViewer_.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...rb.dll
windows7-x64
3$PLUGINSDI...rb.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 11:37
Behavioral task
behavioral1
Sample
8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$_4_/TeamViewer_.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$_4_/TeamViewer_.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InvokeShellVerb.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InvokeShellVerb.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/dialogsEx.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/dialogsEx.dll
Resource
win10v2004-20240508-en
General
-
Target
8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe
-
Size
21.8MB
-
MD5
8df1aa737b8c6c4ea21a6578057af930
-
SHA1
4f09fbe15329843b0000009255c82d2eb7124157
-
SHA256
0d1a6735e5f1522903ff8e5c48fbad41b556cdfa796b836a03071fa15a9c57ff
-
SHA512
dcda3fa4002719b09d328e2c68718adbbb2267e815ea2a6b864f4161f51a8f229ef108bf56a52c4f8e078c7bccaf27c18089b83a86805b816de568a40f37b1a4
-
SSDEEP
393216:FAjMwMg1BIXOuljaia3hs5nnIzPqPvdPUkGVyXOWUSOCRhNjjgMO3tKu:ijMwV1xEeia3u5IzPqhNGUXOWdRhNnNQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4604 TeamViewer_.exe -
Loads dropped DLL 19 IoCs
pid Process 920 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe 4604 TeamViewer_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 920 wrote to memory of 4604 920 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 82 PID 920 wrote to memory of 4604 920 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 82 PID 920 wrote to memory of 4604 920 8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8df1aa737b8c6c4ea21a6578057af930_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"C:\Users\Admin\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.1MB
MD567a3aba3d9d1b3c06f7d29f88462f905
SHA19cad747d67a8f87086207f443a7f1083ae922ea4
SHA25641e3451fa7dcec308581ed259849523a9f8cc5d022290c14a70f632ec55208ba
SHA512b29c1be4025aced75b6dda309b69370403ec6a16f0bd0368bd9011cc86c23db01e438fa3c7dcbe3b877478f0527c11e0b553a5cf2a4158be9ff8687110ec99bf
-
Filesize
76B
MD500d0b831bcd4f7db87768f618270fb02
SHA1e5f69a70661644ee27a6fa0d215f8a5263282417
SHA256b8d53ae825fa56dd7b8cdea0484a4d98ea8ca15f88a511c74833288081c1c2db
SHA512fe5ac6973fffd32fc17ab4afdb375ed8e5fc2bddba7dc47dde4b58361afbd333faaaf018d03c4c7fe7ecf3c1f74cb452c30d18b2a6c0012c3ec95f3c54116a78
-
Filesize
15KB
MD5033ee34c40e8fa85bf2739bcb2f3e186
SHA12ca942f35f77f37df3fc6097acac34f2e77341b7
SHA256c91c1796338a265b49039c0b2c7a312d764b99e5174fb2dae455ca54f8f41ec7
SHA5122204e0b8721b8d85c51bd068b1695b16ee096bfc1d1cd5843f48fd04032aeee2b6a91ce82978a4b3414f3d966ec5b36fb337a4149dae3a1d0445935d964d247f
-
Filesize
11KB
MD50ff2d70cfdc8095ea99ca2dabbec3cd7
SHA110c51496d37cecd0e8a503a5a9bb2329d9b38116
SHA256982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b
SHA512cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e
-
Filesize
210KB
MD505f51bc8ffb2c8f5a2825bf5680301cf
SHA130f7f77dce1fb3526142780e9f5bd5c11622d6b6
SHA256c67cbd5e35e1ce0c7ba17c55d8e2bc33afd5e0a68774554a1fe7216d330c709e
SHA5121e041aaa37dd00414ad955ebc8c0f708589014d2085a5a0b95a31f4d694bb1cc4994bb1324d4b983cbad0449fb0a05560d82c60fdbfc78be67ff61275e451233
-
Filesize
4KB
MD59b0db6a6056e8e51ac35e602aeab769f
SHA1b541c6d2635141cdc3a74f59d55db8df4a92e7ac
SHA256925d80c31702a95d58ede91ee97fd842de78ca6dde69156a6c1a755fba93cd5c
SHA51283fe9d346835940a37e0e0a18d041c9d13fc95a0e9ece3bc18e555cf0e8e7ddf7b42dba422b1e55ace31db3c9fc807e0b44e93b8f07f5acb943eaaf77b4f0ac6
-
Filesize
1KB
MD5f68824a4130ebaf6bc7ab0f62256d7d7
SHA140af19a0d92b3c9e1a8b1eaab7d12c69e5df436a
SHA256cd8149a2e89373075ee6db800b7f2496bacbfe21b23e4a06a3453632503b3965
SHA5126a173aaa183be0e5a516cad484802dae1fc53a414f870f93ea846a9ef9f9df35153766ef632eb5e8ced8f94c2ed09a9decdf3465d46b0dcc44a6918d88e242cb
-
Filesize
45KB
MD54ac3f0ab2e423515ed9c575333342054
SHA1a3e4f2b2135157f964d471564044b023a64f2532
SHA256f223d6c72f86544b358a6301daf60ccdd86198f32e3447a1860acf3f59f2dae9
SHA5128fbd5b4989be51c27fa15af155d2921bea9aa5d0557a22d4224256e678dfe7dcaa5f80917a748c31dc9c9a91573e4618e2497ccfd47eefd7a0fa08c12366a1e5
-
Filesize
2KB
MD54f0ca43bed75c1b29f186d7e33cec1ab
SHA179b639f0f5fe85e78686f6fe18d2ce598ca156d3
SHA2565872af437fbf0862998df4f71e8f72e9cf7865665a2a3f95191c23709fede617
SHA512eaaef1d4be88012b79a27251919ca6073bf75fa7363e74a40408831e17a0ef3e01e4eddacf0ddd580fdd5b83ea5337cd6530497deb2f88be7e719280d87485e5
-
Filesize
193KB
MD5d2ac4ca57f4b624c444c17e8a353deaa
SHA1d713b2b4ff0cec01b5c89bd26127012eed460a32
SHA256a4db659c6265ba7efbbd4906257ef6cdb8f9b1fefba78f01425390729ab3d1f2
SHA512db991671548d9f239acf7b77b47ccbf438c626e803026a68d7c67ec5b3923195c8745f6adbe730fe4c049237217849f8f9f47fc335cf94b1413a7debc9b8d9b1