Overview
overview
7Static
static
31a953973ae...18.exe
windows7-x64
71a953973ae...18.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Coral.dll
windows7-x64
3Coral.dll
windows10-2004-x64
3Coral.exe
windows7-x64
6Coral.exe
windows10-2004-x64
6CoralApp.dll
windows7-x64
1CoralApp.dll
windows10-2004-x64
3CoralDb.dll
windows7-x64
3CoralDb.dll
windows10-2004-x64
3CoralDownload.dll
windows7-x64
3CoralDownload.dll
windows10-2004-x64
3CoralRender.dll
windows7-x64
1CoralRender.dll
windows10-2004-x64
3CoralTrident.dll
windows7-x64
3CoralTrident.dll
windows10-2004-x64
3CoralUI.dll
windows7-x64
1CoralUI.dll
windows10-2004-x64
3CoralUI2.dll
windows7-x64
3CoralUI2.dll
windows10-2004-x64
3CoralUpdate.dll
windows7-x64
3CoralUpdate.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
1a953973ae8428f6f44f37c6fdae3d68_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1a953973ae8428f6f44f37c6fdae3d68_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FileInfo.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FileInfo.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Coral.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Coral.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Coral.exe
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
Coral.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
CoralApp.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
CoralApp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
CoralDb.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
CoralDb.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
CoralDownload.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
CoralDownload.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
CoralRender.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
CoralRender.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
CoralTrident.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
CoralTrident.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
CoralUI.dll
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
CoralUI.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
CoralUI2.dll
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
CoralUI2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
CoralUpdate.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
CoralUpdate.dll
Resource
win10v2004-20240508-en
General
-
Target
Coral.exe
-
Size
391KB
-
MD5
f22c19dda6a7b1ee28a17c96da81708a
-
SHA1
2e562cd48ac73b66fdfe66389c57b05abc205be2
-
SHA256
2f54d182dc21951bf4bc083bc479bf5afa7fc3ce2bc0d4153fc122824d94ea43
-
SHA512
9c370d716f88db992e424f6899a50962eea9f19478022263c95cdc06d15d5663e8a25c2dede8b6728407e75b8c201fa162b91e5b747188f77e37b83c1c37234b
-
SSDEEP
6144:H0bHfnkqOFQl7ZpbJelj7vC18dViTXCix327:UTfOG7ZpbJ0LXibC97
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Coral.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Coral.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4940 Coral.exe 4940 Coral.exe 4940 Coral.exe 4940 Coral.exe 4940 Coral.exe 4940 Coral.exe 4476 Coral.exe 4476 Coral.exe 4940 Coral.exe 4940 Coral.exe 4476 Coral.exe 4476 Coral.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4940 Coral.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4476 Coral.exe 4476 Coral.exe 4476 Coral.exe 4940 Coral.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4476 4940 Coral.exe 88 PID 4940 wrote to memory of 4476 4940 Coral.exe 88 PID 4940 wrote to memory of 4476 4940 Coral.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Coral.exe"C:\Users\Admin\AppData\Local\Temp\Coral.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Coral.exe--type=render --channel=Coral.Pipe.Event.Write.{67E3CF0B-09F2-4687-B742-989927048ADF}?Coral.Pipe.Event.Read.{1624731F-A4E3-4AF9-AB9D-7853248AB902}?Coral.Pipe.Write.D.{016ED085-66CF-4062-9628-6895EE8E4EAB}?Coral.Pipe.Read.D.{E96A384A-11C6-4E9F-B740-5D64FC4DCD52} --parent_channel=49402⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD599fb8e84b8aa92889349054a60e1f359
SHA11b3dd1afb4fe4533ca16db4dd3e7845c13b0e1c5
SHA2565313e624a817ebcb34675027d12b87465de4fc4fdddfdd74d244490c4911b8e4
SHA5122a99095109445c3ca1b9fad5c87fdfed331641401ca8d19d3ab4d109e18b9dc5feb739485f14f390bd3bcfa3a4325e3b1278fe1bb8690dd8df16edb9af52faac
-
Filesize
1KB
MD54b2e341e43a0a0ba467ba4d5e63b8c15
SHA12d6893b7e58e0cd04886f1f249a8b6ecee3f14ad
SHA256146532e4a21d9040b224ddbdc48ed947b8b7f4a010cf84909ba1747bf31a1c8b
SHA5120c84dcb9a980d82255b1d7e73002630b0f5ecb229a939123da877cd463a2ec08b8906d8fb880b6bff51ce98408e226e12c5bd6b7b9e71e8b1064a0d274f075b5
-
Filesize
12KB
MD55db82a5792cf5f9d090a6e6524e3ba39
SHA16b9e6901dcf49156c4b16ae18920cd49d8ca460e
SHA2561950e76406ab2835d102effb40e68594299db58266d9fe2d8cea64dbf306d6d5
SHA51268940754c9ed78ccb0dbe761768abe9329511713d9b8c6650a65c95ad6b51d5cb4e5a2a1cb2d209969bb1a609e382b16e4e34985428dd6c4507892aa28711b7e
-
Filesize
13KB
MD53ae66c004be7509939b5dcb8bbe8988f
SHA10737768985874cb0e3187c91aca886fac056e1ad
SHA256c79a6aaaa5a0e83a5ba8fcf1caf2a534b02051c304ea98b89752631391a78023
SHA512841b9edbc45f421b1050f4b682d3f96c4083713bb4cfe3ac360f31f6be007fea7bdd7e2cac3ba050e5323be27130cd0c1b316069d383b0e472e089b0ff437d41
-
Filesize
2KB
MD5819d5531372718e04f3591482dcb5181
SHA19bb415c3661a35e7912fdb4b12ad750c128bf857
SHA2567caeb6c92434911ee27789f1a113c4fd3f1d4ec78003dec2c8e394f398af9c9d
SHA5127a1ceb41364f2087401cc577f5d5ee202bad5523d7875aaf0c4cd2ca6326efda38b7e07dba72879767414f1d4aa2c8ac6900f5a09601f3dba8e21b30ba7ba4bb
-
Filesize
885KB
MD569ba8f1ae84519627dc59b8ff35e1d71
SHA1613057da9f0629654044e09957014d141b18db51
SHA256eb2c3dfde241191030c486817b58404d0f68fc14fa4be83b51eef48a4d97ba78
SHA5121e420eba50516f69445d596d303bb68963474f032f7610a95b337b354e46ebe7b50380cd25675f6d54bfbbdb99e006be7a03c4d00b2f6fc465769d53d4b9d755