Overview
overview
7Static
static
73ccc3e661c...18.exe
windows7-x64
73ccc3e661c...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Mame32.chm
windows7-x64
1Mame32.chm
windows10-2004-x64
1kailleraclient.dll
windows7-x64
7kailleraclient.dll
windows10-2004-x64
7mame32k.exe
windows7-x64
7mame32k.exe
windows10-2004-x64
7mame32kk.exe
windows7-x64
1mame32kk.exe
windows10-2004-x64
1zip32.dll
windows7-x64
3zip32.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 09:19
Behavioral task
behavioral1
Sample
3ccc3e661c87c5207bfecc89e6c6cc98_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ccc3e661c87c5207bfecc89e6c6cc98_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Mame32.chm
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Mame32.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
kailleraclient.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
kailleraclient.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
mame32k.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
mame32k.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
mame32kk.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
mame32kk.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
zip32.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
zip32.dll
Resource
win10v2004-20240709-en
General
-
Target
Mame32.chm
-
Size
115KB
-
MD5
a197174720acb2e0917253e6c983ddb9
-
SHA1
707dabc9c496239d818f57d6dcc9029350adfbe0
-
SHA256
ad8b509ca1471c69c052230777cd14a5ae947e9e9a2ab3553be797c3b9af80a5
-
SHA512
6952c3e703feee7e96e4a12e6443322e8629aa74104d806e6363d03eb79d6c9f309661d50f50257b4a526ca3b8dfdd7ef3e02fc096942686e1d25dcc9c957ab3
-
SSDEEP
3072:0+QtQ9EkuJDop9QuUdr2pwCGTC+0vCC0PzJYOwMsU:0+QtQif+p9QttEXh+KezJH5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 hh.exe 2296 hh.exe