Overview
overview
7Static
static
377530170e8...18.exe
windows7-x64
377530170e8...18.exe
windows10-2004-x64
3$PLUGINSDI...am.dll
windows7-x64
3$PLUGINSDI...am.dll
windows10-2004-x64
3$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ug.dll
windows7-x64
3$PLUGINSDI...ug.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...te.exe
windows7-x64
7$PLUGINSDI...te.exe
windows10-2004-x64
7$PLUGINSDI...te.exe
windows7-x64
7$PLUGINSDI...te.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
77530170e8d5543ca80ef97f132af295_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77530170e8d5543ca80ef97f132af295_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ExLicensePage.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ExLicensePage.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/FILEDownPlug.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/FILEDownPlug.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/exadx4_desknote.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/exadx4_desknote.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/quicklink_desknote.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/quicklink_desknote.exe
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/quicklink_desknote.exe
-
Size
41KB
-
MD5
461904ebd140d4bad858329f729bbfaf
-
SHA1
eb6234b7150900bd75e42f9de68bdd84239119fd
-
SHA256
c500be494ba46717484997633dbd0f400f3e86bbea13f277810e8f7d8f0a31e3
-
SHA512
3f3d63189476eceef30461760acacbeab3c66de00b5afbc41b1a0877c35796715dbe838aad802ed6e8c7497c42e8d4e40d9274d6391bffd0c43d848f5dd1e8d6
-
SSDEEP
768:EHJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJ4njNctAllGws0q6:EpgpHzb9dZVX9fHMvG0D3XJYNcOmyq6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2160 quicklink_desknote.exe 2160 quicklink_desknote.exe 2160 quicklink_desknote.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quicklink_desknote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30 PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30 PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30 PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30 PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30 PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30 PID 2160 wrote to memory of 2808 2160 quicklink_desknote.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\quicklink_desknote.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\quicklink_desknote.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c \DelUS.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196B
MD5d0e78ebcf67db9a0099b866bdf655488
SHA17cbf6733e92d99b611273d3b8a576f661627f7f3
SHA256860f2157bb2d0d85050d0b9b4de49317ebdb864bede72189fafe9e6f28ec6483
SHA512a17ee67903e88b2e6cea3d8b887662bcc06062bf58775e1970ce3ef8995b065fc6bd2371bf80b39e197641099b6a01b5f8d864875b28fcdebc35f408bd236a35
-
Filesize
28KB
MD50bdd7c6f1046ea4b42839f991ae53fb2
SHA1cb9baefb10159b4a684fa1ee4372e7715865052d
SHA2560a0019b2603dbc4505453c2501255ab0cc0b3c317ece4a6ce0cfb6a02a30907b
SHA51296f41497f25d7bc81f51ab167f74243b4b767089c89c26f9752ef518fa60dedd2722c66ae87dad2334bcce1622bc12f7b9b892ae654ca58cecd9f35c9f1dc163
-
Filesize
20KB
MD52dc96e6ef39e0472a2e21f3e71157cea
SHA1660377e9d5c7189a9b8320925bc0c4620f7d7cc7
SHA25692e1e72c1fd1f941172dc37ac8a29732e326d5482602c981d1b69bc31b0907ba
SHA512b321d349c65e4eef7475ed4275f7e5fcaf1748e9da184da6eef3bc4c4d48a4e307f5e88c80739c669d2cec2c3cd3f933db78aa471f8190de9d0728b1d9dc2273
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f