Overview
overview
7Static
static
7d584a71eda...18.exe
windows7-x64
7d584a71eda...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/service.exe
windows7-x64
7$TEMP/service.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/$S...1_.exe
windows7-x64
7$SYSDIR/$S...1_.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/$_5_.dll
windows7-x64
6$SYSDIR/$_5_.dll
windows10-2004-x64
6$TEMP/setup.exe
windows7-x64
7$TEMP/setup.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 02:31
Behavioral task
behavioral1
Sample
d584a71edadfcf156eb2b63528713fd6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d584a71edadfcf156eb2b63528713fd6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/service.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/service.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$SYSDIR/$SYSDIR/$_1_.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$SYSDIR/$SYSDIR/$_1_.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$SYSDIR/$_5_.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$SYSDIR/$_5_.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/setup.exe
Resource
win7-20240903-en
General
-
Target
$TEMP/setup.exe
-
Size
4.8MB
-
MD5
8925c3f80d88090a7c62873d88e60766
-
SHA1
6e158dfc5672d31f2af69544d8a5814ab837f335
-
SHA256
3117e0c89429e29f81626d4e10e80e31b8fd405ae6d8e2d3d48ec2eefeca0efc
-
SHA512
e6c6d1d50a6660e4b0613d5e2195401b84b68a44f2ccf08fcd474a06b42094a2a816eebe9229565c0722941fe4240c3475f8f0a4da6c07a26dbc54e2a634ae9e
-
SSDEEP
98304:x5sPHw0/GGekjZksmkwuPRhLyYiEF2HMAxBb1hdwcIt1fWDse1QELhLjeMa520KH:rs/wgzeqZksmkPeLEF2HMAzfGc8WT5hR
Malware Config
Signatures
-
resource yara_rule behavioral17/memory/2648-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral17/memory/2648-2-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe