Overview
overview
7Static
static
3074416033f...18.exe
windows7-x64
7074416033f...18.exe
windows10-2004-x64
7$PLUGINSDI...s.html
windows7-x64
1$PLUGINSDI...s.html
windows10-2004-x64
1$PLUGINSDI...w.html
windows7-x64
1$PLUGINSDI...w.html
windows10-2004-x64
1$PLUGINSDI...l.html
windows7-x64
1$PLUGINSDI...l.html
windows10-2004-x64
1$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...l.html
windows7-x64
1$PLUGINSDI...l.html
windows10-2004-x64
1$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
1$PLUGINSDI...ss.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDIR/nswg.dll
windows7-x64
3$PLUGINSDIR/nswg.dll
windows10-2004-x64
3$PLUGINSDI...e.html
windows7-x64
1$PLUGINSDI...e.html
windows10-2004-x64
1$PLUGINSDI...w.html
windows7-x64
1$PLUGINSDI...w.html
windows10-2004-x64
1$PLUGINSDIR/xvid.exe
windows7-x64
7$PLUGINSDIR/xvid.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
074416033f8f4a0c786a6c299af897ec_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
074416033f8f4a0c786a6c299af897ec_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Components.html
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Components.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Components_noadw.html
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Components_noadw.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Final.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Final.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Install.html
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Install.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/Progress.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/Progress.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nswg.dll
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nswg.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/welcomepage.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/welcomepage.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/welcomepage_noadw.html
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/welcomepage_noadw.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/xvid.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/xvid.exe
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/xvid.exe
-
Size
637KB
-
MD5
cfda0738d62a6ce3b605551e311b3c37
-
SHA1
435203e7f713c4484ca4f50f43e847f3dc118962
-
SHA256
a7e72dc1ece52648fae949dd9e25785a611cf6c25512ccd5d0f9dba99456cc50
-
SHA512
3fe7e79004dd24138e294d611d7c301e0686b0636811ae91005a19272c9d30b23a45abe7015967994794b260a2305ad99a0c3a86cb39fb90ecb87e565a78b226
-
SSDEEP
12288:smz39dIoR2bbiwFHDZeUJiFA+KXCJaVkjR6h3Q+sZli4pZd:sI39dhcFtZHiJ8CJaGja/8Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 is-MOJTM.tmp -
Loads dropped DLL 3 IoCs
pid Process 2136 xvid.exe 2224 is-MOJTM.tmp 2224 is-MOJTM.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2224 is-MOJTM.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2224 2136 xvid.exe 28 PID 2136 wrote to memory of 2224 2136 xvid.exe 28 PID 2136 wrote to memory of 2224 2136 xvid.exe 28 PID 2136 wrote to memory of 2224 2136 xvid.exe 28 PID 2136 wrote to memory of 2224 2136 xvid.exe 28 PID 2136 wrote to memory of 2224 2136 xvid.exe 28 PID 2136 wrote to memory of 2224 2136 xvid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\xvid.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\xvid.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\is-83OLO.tmp\is-MOJTM.tmp"C:\Users\Admin\AppData\Local\Temp\is-83OLO.tmp\is-MOJTM.tmp" /SL4 $3012C "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\xvid.exe" 412643 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
647KB
MD5125b1be5897ffb844be040a35041d695
SHA1a64833cd932694d025057a4188068ec9c1690f0d
SHA25694112c7da38b3445aaced3aa9e56cbf6d3c9e70ee599ebbf5ce586752aeb4bc2
SHA5122a1b690997b14c0db0453c4af206f76eb0da2f61c96f806f8ed1fb2fb4fd033bf7da90a6b46670c787a957145b4fb121a14835344fe55b81942aea71d93fb104
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3