Overview
overview
3Static
static
3dc09bfdb8d...18.exe
windows7-x64
3dc09bfdb8d...18.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3aria2c.exe
windows7-x64
1aria2c.exe
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
dc09bfdb8ddba6231ccd124de1170c51_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc09bfdb8ddba6231ccd124de1170c51_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
7za.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
aria2c.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
aria2c.exe
Resource
win10v2004-20240802-en
General
-
Target
7za.exe
-
Size
574KB
-
MD5
42badc1d2f03a8b1e4875740d3d49336
-
SHA1
cee178da1fb05f99af7a3547093122893bd1eb46
-
SHA256
c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
-
SHA512
6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
SSDEEP
12288:myyKdVnyNhXCV4EkP7AIfzNXZ0b5NrnkcAqIV0A1caRI:mKvyNhXCV4E8BXAfrnkcAqU0A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7za.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe