Overview
overview
7Static
static
3df1bd179a9...18.exe
windows7-x64
7df1bd179a9...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/toolbar.exe
windows7-x64
7$TEMP/toolbar.exe
windows10-2004-x64
7content/ctoolbar.js
windows7-x64
3content/ctoolbar.js
windows10-2004-x64
3components/Conduit.js
windows7-x64
3components/Conduit.js
windows10-2004-x64
3components...rch.js
windows7-x64
3components...rch.js
windows10-2004-x64
components...rt.dll
windows7-x64
3components...rt.dll
windows10-2004-x64
3components...ax.dll
windows7-x64
3components...ax.dll
windows10-2004-x64
3components...icy.js
windows7-x64
3components...icy.js
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
df1bd179a99115f0d5283c1eccf1b4c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df1bd179a99115f0d5283c1eccf1b4c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/toolbar.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/toolbar.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
content/ctoolbar.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
content/ctoolbar.js
Resource
win10v2004-20240910-en
Behavioral task
behavioral15
Sample
components/Conduit.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
components/Conduit.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
components/ConduitAutoCompleteSearch.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
components/ConduitAutoCompleteSearch.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
components/FFAlert.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
components/FFAlert.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
components/npmozax.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
components/npmozax.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
components/nsAxSecurityPolicy.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
components/nsAxSecurityPolicy.js
Resource
win10v2004-20240910-en
General
-
Target
$TEMP/toolbar.exe
-
Size
1.3MB
-
MD5
a04dfaa39af875e13512c26cf957a229
-
SHA1
6bf3f56946de48ad29a8ebb36940c5e9feb17b5c
-
SHA256
0527347868aa9122a9a0b128f01e9cefd2ba1ff4afe779cd5267246457295e5e
-
SHA512
ffafe495369993f706dd1595294079ff61d58d9880a65bbb6bd50f87284dd91e8e344b3fd3450976ff7570f67a572aaf3a268b3fe26529ad97e39452f8103c02
-
SSDEEP
24576:tknpMms4RFrIrihffVSPrhiWgFpfC7FjSSf0mQmtwXghDQk:tkBmr4VSPr4Fc7FWS04wwh0k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3704 GLBA3A2.tmp -
Loads dropped DLL 5 IoCs
pid Process 3704 GLBA3A2.tmp 3704 GLBA3A2.tmp 3704 GLBA3A2.tmp 3704 GLBA3A2.tmp 3704 GLBA3A2.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLBA3A2.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toolbar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLBA3A2.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3704 4596 toolbar.exe 83 PID 4596 wrote to memory of 3704 4596 toolbar.exe 83 PID 4596 wrote to memory of 3704 4596 toolbar.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\toolbar.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\toolbar.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\GLBA3A2.tmpC:\Users\Admin\AppData\Local\Temp\GLBA3A2.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$TEMP\toolbar.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD51de1b348b2a64694f39e90b1eddfc910
SHA1ead9a61cfc3d805e94d2c513fc745bf0868298f3
SHA256c66ea345cb128242f5a21dab4f15d75e6203d908fc994af7a2c47a6e4c983f55
SHA51215d49aafe822d205767d34d7182d871bbafb574d7ea3ad458b5420b23e3eb41cf637649358c7529ff433057590b0835d068640cc202409e67889e5718e6f217b
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
10KB
MD53b2e23d259394c701050486e642d14fa
SHA14e9661c4ba84400146b80b905f46a0f7ef4d62eb
SHA256166d7156142f3ee09fa69eb617dd22e4fd248aa80a1ac08767db6ad99a2705c1
SHA5122b792296dffa4e43bc85295dc7691bd29762ce5d9d5eafaa74e199e6a8e5b24aa85d0a1b27776d4719a49b0d29abcf6f240746a209528e608b596b560e5a3b88