Overview
overview
10Static
static
3e539f76d6c...18.exe
windows7-x64
3e539f76d6c...18.exe
windows10-2004-x64
3$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3avsuite.exe
windows7-x64
10avsuite.exe
windows10-2004-x64
3htmlayout.dll
windows7-x64
1htmlayout.dll
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
e539f76d6cf5af0fc46788f3fd99094f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e539f76d6cf5af0fc46788f3fd99094f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
avsuite.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
avsuite.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
htmlayout.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
htmlayout.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240802-en
General
-
Target
avsuite.exe
-
Size
1.2MB
-
MD5
0c3769be424feaaebeea53c2c92728b0
-
SHA1
2558406f6093a3bb5fb7e1130725218bddca2c96
-
SHA256
bf3731c49d8091dafb9f6dad0615db06fb9f8eec9cd391506886e03ce0074568
-
SHA512
527b472db7a46effe3ddd89b2988606b6e976b9b03f6d1375572b711f9578ad5480fca97822269649f907098cd59be087ea33b7ac3ef675ca33784743ecd5f6c
-
SSDEEP
24576:MUVi6KHMuZmHBxLxIjC+TOFRq3sT7G8hysS/v1y9cv:TVidHpZmx1/vFHT7Qy9cv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" avsuite.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "0" avsuite.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "0" avsuite.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" avsuite.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "0" avsuite.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" avsuite.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "0" avsuite.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avsuite.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main avsuite.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 avsuite.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3052 avsuite.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3052 avsuite.exe 3052 avsuite.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\avsuite.exe"C:\Users\Admin\AppData\Local\Temp\avsuite.exe"1⤵
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52B
MD50ca1457a514e6287db2a8ea23aedc922
SHA187f08fde13c9468e4169fad0ddfc2b9dc9706fef
SHA2561662a2b29a4d6ae99c0238c0365ca477dbdbce4452efa7d70237eaea25931257
SHA5120db23259fd910c649600aea5e8a3bcb73ab95b5657e5ccac5a709b438d88e2c0671ef52a943f1fe0e38091721bd745ec9e3692846cc32f13f0e4ab4c3cc40d6b