Overview
overview
7Static
static
387689098c3...18.exe
windows7-x64
787689098c3...18.exe
windows10-2004-x64
7Documents ...up.exe
windows7-x64
Documents ...up.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/A245...57.dll
windows7-x64
3$TEMP/A245...57.dll
windows10-2004-x64
3$TEMP/A245...18.dll
windows7-x64
3$TEMP/A245...18.dll
windows10-2004-x64
3$TEMP/A245...109.7z
windows7-x64
3$TEMP/A245...109.7z
windows10-2004-x64
3install.html
windows7-x64
3install.html
windows10-2004-x64
3js/bramus/...ler.js
windows7-x64
3js/bramus/...ler.js
windows10-2004-x64
3js/prototy...ype.js
windows7-x64
3js/prototy...ype.js
windows10-2004-x64
3lic.html
windows7-x64
3lic.html
windows10-2004-x64
3page - к�...�.html
windows7-x64
3page - к�...�.html
windows10-2004-x64
3page.html
windows7-x64
3page.html
windows10-2004-x64
3page2.html
windows7-x64
3page2.html
windows10-2004-x64
3page3.html
windows7-x64
3page3.html
windows10-2004-x64
3page4.html
windows7-x64
3page4.html
windows10-2004-x64
3page5.html
windows7-x64
3page5.html
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
87689098c31b845fa5dc1eb6b8d47bde_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87689098c31b845fa5dc1eb6b8d47bde_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Documents and Settings/Admin/Рабочий стол/SkypeSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Documents and Settings/Admin/Рабочий стол/SkypeSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/A2451303/e1051557.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$TEMP/A2451303/e1051557.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/A2451303/q1066618.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$TEMP/A2451303/q1066618.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/A2451303/x1010109.7z
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$TEMP/A2451303/x1010109.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
install.html
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
install.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
js/bramus/jsProgressBarHandler.js
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
js/bramus/jsProgressBarHandler.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
js/prototype/prototype.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
js/prototype/prototype.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
lic.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
lic.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
page - копия.html
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
page - копия.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
page.html
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
page.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
page2.html
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
page2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
page3.html
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
page3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
page4.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
page4.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
page5.html
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
page5.html
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/A2451303/x1010109.7z
-
Size
226KB
-
MD5
2ece60cb284456cd0a454af87ffd9a1d
-
SHA1
09ab2a5730cd11814ac58eccb498df2f081cd4ca
-
SHA256
d4f56c1ff0aced689962630b157b3cb521f1ea3ead67240be77fbeddab1236c3
-
SHA512
59d4c5a6fbea36d76ff17ef52de0193d430b9efdf674f36493794ec92f825ab82f75a21448999d10453cee197855c20046f9370c5fc5da83d0654ddaadde3c26
-
SSDEEP
3072:ynHYXkr5HGhqYS/nOTQx4FbsxP8MlI9Q+lVxjC11/NrM3BmQrOo:LU5EqFnOsx4F+emQh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1592 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1592 AcroRd32.exe 1592 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2616 2312 cmd.exe 31 PID 2312 wrote to memory of 2616 2312 cmd.exe 31 PID 2312 wrote to memory of 2616 2312 cmd.exe 31 PID 2616 wrote to memory of 2804 2616 rundll32.exe 32 PID 2616 wrote to memory of 2804 2616 rundll32.exe 32 PID 2616 wrote to memory of 2804 2616 rundll32.exe 32 PID 2804 wrote to memory of 1592 2804 rundll32.exe 34 PID 2804 wrote to memory of 1592 2804 rundll32.exe 34 PID 2804 wrote to memory of 1592 2804 rundll32.exe 34 PID 2804 wrote to memory of 1592 2804 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$TEMP\A2451303\x1010109.7z1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$TEMP\A2451303\x1010109.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\$TEMP\A2451303\x1010109.7z3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\$TEMP\A2451303\x1010109.7z"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d2cc9d81b57f428048ff2080e30a9202
SHA1a31e651901e00ad5c99f362dbe292ab93d77bab6
SHA25650b9fc1e5ef8e7506c96788978d3b42dc761dbd1a5e040942b8a03f4432c9130
SHA51262bd495413ee27e5f1ab96d5a4da0f60ea8add168dde2f9948e61a23498bb8c19024b5914b96e81d7ec100d134f8ff76e2340ebf0f20264dff6a5bfaa9f0e016