Overview
overview
7Static
static
3dc3126c76c...18.exe
windows7-x64
7dc3126c76c...18.exe
windows10-2004-x64
7$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...me.exe
windows7-x64
7$PLUGINSDI...me.exe
windows10-2004-x64
7$TEMP/goog...up.exe
windows7-x64
3$TEMP/goog...up.exe
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
7$PLUGINSDI...ar.exe
windows10-2004-x64
7$TEMP/goog...ed.exe
windows7-x64
3$TEMP/goog...ed.exe
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ed.dll
windows7-x64
3$PLUGINSDI...ed.dll
windows10-2004-x64
3$PLUGINSDI...r.html
windows7-x64
3$PLUGINSDI...r.html
windows10-2004-x64
3$PLUGINSDI...LC.exe
windows7-x64
3$PLUGINSDI...LC.exe
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
dc3126c76c2d8ae142f71b15a5dfd7d1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc3126c76c2d8ae142f71b15a5dfd7d1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/g/PRFA-Chrome.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/g/PRFA-Chrome.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/googleupdatesetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$TEMP/googleupdatesetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/g/PRFA-IEToolbar.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/g/PRFA-IEToolbar.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/googletoolbarinstaller_stub_signed.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/googletoolbarinstaller_stub_signed.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/g/gcapi_dll.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/g/gcapi_dll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/g/gtapi_signed.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/g/gtapi_signed.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/g/gtb/toolbar.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/g/gtb/toolbar.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/g/pfLC.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/g/pfLC.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/g/PRFA-Chrome.exe
-
Size
563KB
-
MD5
9341392aef629d21f94be538830ed7ee
-
SHA1
c935f77dfb055deb5118a157fa526b4efc1cd3d3
-
SHA256
7dedf4ac72b35c13e5921c42adf46a8c3aafffe15768be4cf13bf30ae498f079
-
SHA512
b5cf73a5e976791312af5ceb1f718de03b0b003f6e0dd497e5cb970d781140a6056d283410edf94dbb6c951c85f0bf88df3d4b6d7ec1dd51f0c0c0f1c8a8963b
-
SSDEEP
12288:3mt6ciOkXAQjfbE2YCyz+/UcYyOk3jFZcngtv9e+z:Wt6NOIo2xy6MlTkuCle+z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2936 googleupdatesetup.exe 864 GoogleUpdate.exe -
Loads dropped DLL 5 IoCs
pid Process 2720 PRFA-Chrome.exe 2936 googleupdatesetup.exe 864 GoogleUpdate.exe 864 GoogleUpdate.exe 864 GoogleUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PRFA-Chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language googleupdatesetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 864 GoogleUpdate.exe 864 GoogleUpdate.exe 864 GoogleUpdate.exe 864 GoogleUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 864 GoogleUpdate.exe Token: SeDebugPrivilege 864 GoogleUpdate.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2720 wrote to memory of 2936 2720 PRFA-Chrome.exe 30 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31 PID 2936 wrote to memory of 864 2936 googleupdatesetup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\g\PRFA-Chrome.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\g\PRFA-Chrome.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\googleupdatesetup.exegoogleupdatesetup.exe /silent /install "appguid={8A69D345-D564-463c-AFF1-A69D9E530F96}&appname=Google%20Chrome&needsadmin=True&brand=PRFA&usagestats=0" /appargs "appguid={8A69D345-D564-463c-AFF1-A69D9E530F96}&installerdata=%7B%22homepage%22%3A%22http%3A%2F%2Fwww.google.com%22%2C%22homepage_is_newtabpage%22%3Afalse%2C%22distribution%22%3A%7B%22skip_first_run_ui%22%3Atrue%2C%22show_welcome_page%22%3Atrue%2C%22import_search_engine%22%3Afalse%2C%22import_history%22%3Afalse%2C%22create_all_shortcuts%22%3Atrue%2C%22do_not_launch_chrome%22%3Atrue%2C%22make_chrome_default%22%3Afalse%2C%22system_level%22%3Atrue%2C%22verbose_logging%22%3Afalse%7D%7D"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\GUM6374.tmp\GoogleUpdate.exeC:\Users\Admin\AppData\Local\Temp\GUM6374.tmp\GoogleUpdate.exe /silent /install "appguid={8A69D345-D564-463c-AFF1-A69D9E530F96}&appname=Google%20Chrome&needsadmin=True&brand=PRFA&usagestats=0" /appargs "appguid={8A69D345-D564-463c-AFF1-A69D9E530F96}&installerdata=%7B%22homepage%22%3A%22http%3A%2F%2Fwww.google.com%22%2C%22homepage_is_newtabpage%22%3Afalse%2C%22distribution%22%3A%7B%22skip_first_run_ui%22%3Atrue%2C%22show_welcome_page%22%3Atrue%2C%22import_search_engine%22%3Afalse%2C%22import_history%22%3Afalse%2C%22create_all_shortcuts%22%3Atrue%2C%22do_not_launch_chrome%22%3Atrue%2C%22make_chrome_default%22%3Afalse%2C%22system_level%22%3Atrue%2C%22verbose_logging%22%3Afalse%7D%7D"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD56139833c1eff3eeeaacd9878c9a0c4b9
SHA1d945fbe6565c7ab8a52d182e023d30f25fd8b72d
SHA25679bf56e8c74e71a257466952c7c14d4cb5f82d88bc2b31583d35d0576a1cbaa6
SHA51290b0b6256f216cd80d63435230096bc1c8da2d4bd4710dfddbfd726104dea1fa9e082d364c17c860dd0a74fb9a96a9a79d78ea25c5b6940b9606fd11515e4d18
-
Filesize
25KB
MD50b9fdab446864554b59a91c9cd3389cb
SHA17f7ad94aeb3637474c7ea94489e76abf474edbef
SHA256cc7b40c670d54fc86c5370fe0888fa669c9ecb46f010a1765654d96ea4956c3f
SHA512ae66abf8d5a189cad86cd3293de9db76d92381641d1658c172fd42bff064da82b51c18412b4e98a4e9c3e4865eab02bd0cd06b377b7ab88cdcdd40814279e0b7
-
Filesize
549KB
MD501e1716a03b513f6538e022dd0ec6ea5
SHA19bbbf3b31340f4b049fd97ccfd34b2a03ac4ec39
SHA256d31b7c8cf3207b19e18e899523a3d7caabf8fd1ac5cca38a4bada87516333091
SHA512ccf065518cab5f34001f61f2e7f5350862c75b1b8cab7a8697712bbf4fb28789496229422a7cddaa68befb7d93afab3c37e799d4b267c300d56333f5a15cada6
-
Filesize
132KB
MD5f02a533f517eb38333cb12a9e8963773
SHA1258810d71436c5157cd0752bd13ce1de20f27eb2
SHA2561f72cd1cf660766fa8f912e40b7323a0192a300b376186c10f6803dc5efe28df
SHA5121fd44fd4b6b73327a913dd85efe2d8125896e3dd4b5c7801d7d9afd594d6536f4e825a767fad4af13f03397783ff4dd448e0071037e72fd8fdf685825ee6b4fa