Overview
overview
8Static
static
33907745589...18.exe
windows7-x64
73907745589...18.exe
windows10-2004-x64
8$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/GOPlayer.exe
windows7-x64
7$TEMP/GOPlayer.exe
windows10-2004-x64
8Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7General
-
Target
3907745589a0a4fb1d95938886065f45_JaffaCakes118
-
Size
104KB
-
Sample
240711-n659gsxgnd
-
MD5
3907745589a0a4fb1d95938886065f45
-
SHA1
28ef0424022e8f987bc1f345b93e99cf0b48661f
-
SHA256
ac23631561f5cce46f391be304eb2664b56aae6ec89856c1a7de161d488ba829
-
SHA512
58f40d4a9e46cfc70e0f1671e7bd9beee3b92136de72028b553d5eeaf4186af41f356dd96af11c3888788801f096521ce2978d3f51f9cc657459cac4539771c3
-
SSDEEP
3072:9TvfTzcTsw6RZveZ5VJezF7ZVTWNd6fj2:JvfTwQweCVJU7LyNwfi
Static task
static1
Behavioral task
behavioral1
Sample
3907745589a0a4fb1d95938886065f45_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3907745589a0a4fb1d95938886065f45_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMP/GOPlayer.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/GOPlayer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
3907745589a0a4fb1d95938886065f45_JaffaCakes118
-
Size
104KB
-
MD5
3907745589a0a4fb1d95938886065f45
-
SHA1
28ef0424022e8f987bc1f345b93e99cf0b48661f
-
SHA256
ac23631561f5cce46f391be304eb2664b56aae6ec89856c1a7de161d488ba829
-
SHA512
58f40d4a9e46cfc70e0f1671e7bd9beee3b92136de72028b553d5eeaf4186af41f356dd96af11c3888788801f096521ce2978d3f51f9cc657459cac4539771c3
-
SSDEEP
3072:9TvfTzcTsw6RZveZ5VJezF7ZVTWNd6fj2:JvfTwQweCVJU7LyNwfi
Score8/10-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
9KB
-
MD5
0a58a89b32428fb848099f33e814e3ed
-
SHA1
661b73c3ff3579eb9d0c482af7354ee0461634a9
-
SHA256
aba4f462067f8c872d84c4c1ad6eaccf8bb6546c67c011964f8d2b62170f8236
-
SHA512
1f4efa7183670f9e9bcf1be56b3165393a97da29080bf1353358933f0f2e0544706982059a9408639782163f4f05bc9d38fca9be110f7d3058f2b0e0017e8dc5
-
SSDEEP
96:Y0uUUpZMb4pkXuzaVS1pZkrDSgPKqjOYiktlcyFBtsxwwAICZ:ipZS+zac+KdqjOYRcoB6xkICZ
Score3/10 -
-
-
Target
$TEMP/GOPlayer.exe
-
Size
21KB
-
MD5
a55b5977b2b52f329fd046633021f101
-
SHA1
a6282b275489e8567e3cd825b63adca1f2ab8d50
-
SHA256
e32880721fa08f661fa03c0a60101e2426da4f4a013db2962fb9214e42fcb681
-
SHA512
3301db24d011ac186e25c0116fc7d2fe0f0a5d057843906ecd579e4084c3559e377255b859a7caf155dc8ba35a9867d8205fd3b8b8f57b835703023c05130c36
-
SSDEEP
384:2mM60LX3BVE6A15dNIahBtLD/trDc1sdg/yQnm1y9NE9mbi9giYxw:RMHbRE1RIahBtf/1wWd4A4bi92q
Score8/10-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
-
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
0562da21a0b14b8b08eec98ee7b98495
-
SHA1
40cd950b66bf044472ddf4585cade81e7fdd8b69
-
SHA256
4314e4d3c70b0bf1039337dd1bd5505b354ea30699653a513ab33916b775746a
-
SHA512
1e6a3caf688de88ef28d634b038a2ad0170f656e0fbc61db99b63cefcc20898404e3388d0906090245ed34e20a76e4f9d5076937739ace64e9b018134f025674
-
SSDEEP
1536:97ANUHtHV6AWzwfFJUPfT4t3kUYp+djPw6Rl7RJg5ZJE4:9TvfTzcTsw6RZve3
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-