Overview
overview
7Static
static
7724a832967...18.exe
windows7-x64
7724a832967...18.exe
windows10-2004-x64
7$TEMP/Team...r_.exe
windows7-x64
7$TEMP/Team...r_.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$TEMP/Team...AS.exe
windows7-x64
1$TEMP/Team...AS.exe
windows10-2004-x64
3$TEMP/Team...TV.dll
windows7-x64
3$TEMP/Team...TV.dll
windows10-2004-x64
3$TEMP/Team...er.exe
windows7-x64
7$TEMP/Team...er.exe
windows10-2004-x64
7$TEMP/Team...ce.exe
windows7-x64
3$TEMP/Team...ce.exe
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 02:40
Behavioral task
behavioral1
Sample
724a832967b6f8fcd21bc43a1927e969_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
724a832967b6f8fcd21bc43a1927e969_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$TEMP/TeamViewer/Version4/TeamViewer_.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$TEMP/TeamViewer/Version4/TeamViewer_.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$TEMP/TeamViewer/Version4/SAS.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$TEMP/TeamViewer/Version4/SAS.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$TEMP/TeamViewer/Version4/TV.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$TEMP/TeamViewer/Version4/TV.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$TEMP/TeamViewer/Version4/TeamViewer.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$TEMP/TeamViewer/Version4/TeamViewer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$TEMP/TeamViewer/Version4/TeamViewer_Service.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$TEMP/TeamViewer/Version4/TeamViewer_Service.exe
Resource
win10v2004-20240709-en
General
-
Target
$TEMP/TeamViewer/Version4/TeamViewer_.exe
-
Size
1.4MB
-
MD5
76d48872ed7b15e077120498d3ac3f07
-
SHA1
523a7528e1e2e58cc224aa974456969f8f91a820
-
SHA256
5cd3660829c4b3d8f7fafdb93c8b82c11198f6910662c09c92f65ac6035df7d1
-
SHA512
c3365c86aa5f5a171f2289eb3ee1f00368451553ccda9052e229cff35c94859c5dacd5d88a36d994c52c4b73502d7654b5dc0994c75437b1569d472fb229b8b3
-
SSDEEP
24576:eiT9MV7CCLSvhWZtGRbCr7EpmACmacCZ0ClEtgcR6i1G3SZrbAQ39xKRsyVDgNMy:7T9MvOvQO+r7nAGZ0iYX6nSVFXByVgN1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation TeamViewer_.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 TeamViewer.exe -
Loads dropped DLL 7 IoCs
pid Process 860 TeamViewer_.exe 860 TeamViewer_.exe 860 TeamViewer_.exe 860 TeamViewer_.exe 860 TeamViewer_.exe 860 TeamViewer_.exe 2744 TeamViewer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/memory/860-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral4/memory/860-50-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\QS\SAS.exe TeamViewer.exe File opened for modification C:\Program Files (x86)\QS\SAS.exe TeamViewer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeamViewer_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeamViewer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 TeamViewer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2744 TeamViewer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 860 wrote to memory of 2744 860 TeamViewer_.exe 87 PID 860 wrote to memory of 2744 860 TeamViewer_.exe 87 PID 860 wrote to memory of 2744 860 TeamViewer_.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\TeamViewer\Version4\TeamViewer_.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\TeamViewer\Version4\TeamViewer_.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\temp\TeamViewer\Version4\TeamViewer.exe"C:\Users\Admin\temp\TeamViewer\Version4\TeamViewer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD59459a28dbb2752d59eaa8fbb5cf8c982
SHA14ad7eb230cf6d05df967037225fa19dd385bf7cb
SHA2564688dcd01db816485a770cb8fc047fef9a408f3dbec5a2c83752fee115ce6963
SHA5127dff6414f4215aa4c7a168158b4ac5dd422c7dd35c6af58bce658c6bf9bf5a3545a5ee0db5f5d47a17c7ae53cb54551b98b492137e36c73e684b2041d775cd97
-
Filesize
5KB
MD5c6910d6e78c2e5f9d57d0bc6d8f6b736
SHA1a395099062298b3f3c015359b227ca02a72c6e2c
SHA256b2c32af2b0d75dfd08ae4e1ad7c5897957240b32bf7a16855d6a46512d272b9b
SHA5124cd45b887ce5b7fecfd863cae83817465d7378cc9f5b50f5762d5f209c55a37257d94e91dea4c91c66f2c5bf22cdc1f5545eeef52a090f05cceeedf59bbd2a10
-
Filesize
10KB
MD50b96e50e5fd9b241435cfec46600b5a7
SHA11f79688c6bdd78b4e1812b110fd16d27c59b32d5
SHA25610841d8d0a0fa457a62be63af7e30e72ffaec265470dbe16c0d61cc5b111d1e6
SHA51201a5884ce81a622f81da23c4075aef4cbe68d18471908bb6082ad98bfd002c8a6c2b8069d250df0320cde22ad76eedc14a5d9369b370c2012d58575720da48b7
-
Filesize
53KB
MD5bf3bcd752bdabfa1f1e84b7462738103
SHA134cb8ea7d47467cace271e03b7869f37b0ecb30a
SHA25690fe790e189c384f2ab82958057f91fdf40888c2ed3c0471bd7b85d5b36c7810
SHA5126d5362c4d354319845f4522e0d1132c32a6779efc4c013c8c7bd489fddf39cbb5dfb72b135487b660d156d7774e5be4acc03c3fcecdb6dabcfad12630a3f5955
-
Filesize
3.4MB
MD50337483f5fd42db82837d6927eb522e9
SHA19011557916c89e5a0571a95646a9374ad7c174fc
SHA2565ea676632a55b195ad1a6a84cd6af24404482ef6357f73d77c76eb43f57e3845
SHA5123477299ddf80b0a81d6236e4f111c236ee4c6fee4c9982d534be716d4794d86287582b12393ba9de0a67730642190706ee0f96cf11a67efedd88b7b4991d12be
-
Filesize
64KB
MD54b030749eef3498b8efbaf2877a59fb5
SHA170d65a57582fa7145bcf7198e0751e5a3bfffcc5
SHA256ee4f367a4074fa13d15eb17ae9e140d38b249959a29d6e4146c0577df2fed01b
SHA5129a265c06a377bbcaba9b6b0e2752657701fd1fb82613d7ba520e4739108951d0059e1c8d7533a3e94928e5971a9d2fc575d3adc67f4ac768f844c63a5e11e8c7