Overview
overview
7Static
static
7a57618a045...18.exe
windows7-x64
7a57618a045...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...oc.dll
windows7-x64
7$PLUGINSDI...oc.dll
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/Toolbar.exe
windows7-x64
7$TEMP/Toolbar.exe
windows10-2004-x64
7content/aboutTabs.htm
windows7-x64
3content/aboutTabs.htm
windows10-2004-x64
3content/ctoolbar.js
windows7-x64
3content/ctoolbar.js
windows10-2004-x64
3components...rch.js
windows7-x64
3components...rch.js
windows10-2004-x64
3components...bar.js
windows7-x64
3components...bar.js
windows10-2004-x64
3components...re.dll
windows7-x64
3components...re.dll
windows10-2004-x64
3Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 04:53
Behavioral task
behavioral1
Sample
a57618a045dfc6cdeb4b4e145ad96643_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a57618a045dfc6cdeb4b4e145ad96643_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProc.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/Toolbar.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$TEMP/Toolbar.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
content/aboutTabs.htm
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
content/aboutTabs.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
content/ctoolbar.js
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
content/ctoolbar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
components/ConduitAutoCompleteSearch.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
components/ConduitAutoCompleteSearch.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
components/ConduitToolbar.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
components/ConduitToolbar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
components/RadioWMPCore.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
components/RadioWMPCore.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/Toolbar.exe
-
Size
2.6MB
-
MD5
bed7d057903131569907ce3b4e1bffdb
-
SHA1
745879801884d48b9ee9f92cde9a4f270a5ba0bd
-
SHA256
53484c59e5fcf1c22328cad79a54ca84c6503f17c4b6e5edc8ff53c12228b7e3
-
SHA512
ecf29408783b93b3405bac661327915503e862ad6b88b9669b31ab5963427da4b41da5b612e22c261671dc272a5930708e3f30b893974d297eaa8959bab2911f
-
SSDEEP
49152:z3kpJV4IcHWgV3Kvul+0eQxYGzkJLQsq0EpKDA8VbjSYt2JdDkeCN0cYw7Jb4RqA:YsWg4vX0ZuJpTbDFJt2JdDkeCF/li3x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 332 GLB9E33.tmp -
Loads dropped DLL 4 IoCs
pid Process 2204 Toolbar.exe 332 GLB9E33.tmp 332 GLB9E33.tmp 332 GLB9E33.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLB9E33.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Toolbar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB9E33.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2204 wrote to memory of 332 2204 Toolbar.exe 29 PID 2204 wrote to memory of 332 2204 Toolbar.exe 29 PID 2204 wrote to memory of 332 2204 Toolbar.exe 29 PID 2204 wrote to memory of 332 2204 Toolbar.exe 29 PID 2204 wrote to memory of 332 2204 Toolbar.exe 29 PID 2204 wrote to memory of 332 2204 Toolbar.exe 29 PID 2204 wrote to memory of 332 2204 Toolbar.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\GLB9E33.tmpC:\Users\Admin\AppData\Local\Temp\GLB9E33.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5cc169cc690478443cbfcf835b21fb301
SHA124d10364f89ef17802aa945101526005faa1a339
SHA25634ef744d3602adf924752955d7ea488f2a3cc814918b37945669fe90edc9e4c1
SHA512f6c0cd6b88b106177e17285773217f872e04085e84392968cfa937bba61417139bad221c9219eb93c145a3121eb877b942c7ef98e93ada7655f2d264cd552f95
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
10KB
MD53b2e23d259394c701050486e642d14fa
SHA14e9661c4ba84400146b80b905f46a0f7ef4d62eb
SHA256166d7156142f3ee09fa69eb617dd22e4fd248aa80a1ac08767db6ad99a2705c1
SHA5122b792296dffa4e43bc85295dc7691bd29762ce5d9d5eafaa74e199e6a8e5b24aa85d0a1b27776d4719a49b0d29abcf6f240746a209528e608b596b560e5a3b88