Overview
overview
7Static
static
377530170e8...18.exe
windows7-x64
377530170e8...18.exe
windows10-2004-x64
3$PLUGINSDI...am.dll
windows7-x64
3$PLUGINSDI...am.dll
windows10-2004-x64
3$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ug.dll
windows7-x64
3$PLUGINSDI...ug.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...te.exe
windows7-x64
7$PLUGINSDI...te.exe
windows10-2004-x64
7$PLUGINSDI...te.exe
windows7-x64
7$PLUGINSDI...te.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
77530170e8d5543ca80ef97f132af295_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77530170e8d5543ca80ef97f132af295_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ExLicensePage.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ExLicensePage.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/FILEDownPlug.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/FILEDownPlug.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/exadx4_desknote.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/exadx4_desknote.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/quicklink_desknote.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/quicklink_desknote.exe
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/exadx4_desknote.exe
-
Size
41KB
-
MD5
ff614a2aece869e49b4ee75eb7b14000
-
SHA1
3a7f77d114db71cb16b63c336b368cf747c42def
-
SHA256
a99c79a17d104a5f00ab232474e093e5d8a64f1674de386764c8af33f83901f5
-
SHA512
370fcabdb0a185c8447591c47d262b40dc457704c0b21fe1ec77327b96f7d70810aef7a6b678a1924abdc1f1097d6d5c86788bdf479162c8baf647405e2937fb
-
SSDEEP
768:EHJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJyojNctAllGws0q5:EpgpHzb9dZVX9fHMvG0D3XJygNcOmyq5
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 960 exadx4_desknote.exe 960 exadx4_desknote.exe 960 exadx4_desknote.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exadx4_desknote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 960 wrote to memory of 696 960 exadx4_desknote.exe 87 PID 960 wrote to memory of 696 960 exadx4_desknote.exe 87 PID 960 wrote to memory of 696 960 exadx4_desknote.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\exadx4_desknote.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\exadx4_desknote.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \DelUS.bat2⤵
- System Location Discovery: System Language Discovery
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD59039b1e775b7dc3eacae958da88d54f2
SHA1d2c9a9924485dc8d6537ea0df35b9f885f2e3075
SHA2565480b777f723af9aa6ae24463286bcc5e356555e8f93a03dd25756a04c3be0ff
SHA51293ae323ccacdba94c9815d079cd2cce265a6cf07fa2904b644e02f930178126af215ca72323b25a4060d7d3e5487217d1662bac90ca052813de18c9661aafe0d
-
Filesize
28KB
MD50bdd7c6f1046ea4b42839f991ae53fb2
SHA1cb9baefb10159b4a684fa1ee4372e7715865052d
SHA2560a0019b2603dbc4505453c2501255ab0cc0b3c317ece4a6ce0cfb6a02a30907b
SHA51296f41497f25d7bc81f51ab167f74243b4b767089c89c26f9752ef518fa60dedd2722c66ae87dad2334bcce1622bc12f7b9b892ae654ca58cecd9f35c9f1dc163
-
Filesize
20KB
MD52dc96e6ef39e0472a2e21f3e71157cea
SHA1660377e9d5c7189a9b8320925bc0c4620f7d7cc7
SHA25692e1e72c1fd1f941172dc37ac8a29732e326d5482602c981d1b69bc31b0907ba
SHA512b321d349c65e4eef7475ed4275f7e5fcaf1748e9da184da6eef3bc4c4d48a4e307f5e88c80739c669d2cec2c3cd3f933db78aa471f8190de9d0728b1d9dc2273
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f