Overview
overview
7Static
static
7c100ccd865...18.exe
windows7-x64
7c100ccd865...18.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
7$PLUGINSDI...om.dll
windows10-2004-x64
732BC.exe
windows7-x64
732BC.exe
windows10-2004-x64
732bchelp.htm
windows7-x64
332bchelp.htm
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 15:11
Behavioral task
behavioral1
Sample
c100ccd86575e9e2ef61a43771af0905_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c100ccd86575e9e2ef61a43771af0905_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
32BC.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
32BC.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
32bchelp.htm
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
32bchelp.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
32BC.exe
-
Size
226KB
-
MD5
7483bf6d696fb7564c7c8b3eef7e2c14
-
SHA1
3cc78c97d454295f33213ece58ffb3a2361b6cb7
-
SHA256
66d4104de071028b6e0cd1d1c1421ff89698624dade1cdb1051a0ae28ea1d813
-
SHA512
dc4b0725e1f7b0bb60345d8c81a3d29aec8b1e1fd18a9da53c5d987d2be5eab46f34bbeb6395029c74881490d111c0bd269df7c86810cbb4bf42222f68744cf5
-
SSDEEP
6144:EQOCO8L7vglf1VLSpQseBT8UT2NGzrJWCAqHV2ho/w:jOCHXo7LSPe8UCAvHVS
Malware Config
Signatures
-
resource yara_rule behavioral18/memory/4528-0-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral18/memory/4528-133-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral18/memory/4528-137-0x0000000000400000-0x00000000004AE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\32BITCVT.INI 32BC.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32BC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4528 32BC.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4528 32BC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4528 32BC.exe 4528 32BC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD56e5e2fab03a613d50e16f23c292b6ccf
SHA1f19370b2ce624496ff61f1cdb8004d9f77763d86
SHA256b9e53bd239a342f678895d0f2840407ba27d4c10a20f7f1bbc6e5aa4b360cbef
SHA512a9922f98d65e7c050527878574217689e7a691acda97c2d96fb2b36c509392cc49e311cf7b623a6f81365f6c7e601d7ce18d66da5e0c2905a8a6f5657531ffed