Overview
overview
7Static
static
3ea767005d0...18.exe
windows7-x64
7ea767005d0...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7pdvserv.exe
windows7-x64
7pdvserv.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
ea767005d0a9ab6fe2df21c2d0acc8f2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea767005d0a9ab6fe2df21c2d0acc8f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
pdvserv.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
pdvserv.exe
Resource
win10v2004-20240802-en
General
-
Target
pdvserv.exe
-
Size
1.9MB
-
MD5
78e65d6a04a8d8d91c1ae78b605e6e16
-
SHA1
8322ce32e6b4f2f35084cc046427c5c234f18ac8
-
SHA256
e93a3e46d6e8d7d037d9f77a75ee55d2f63665960044a1044813b6d5229d940e
-
SHA512
bdacf51b4b551fff19c34d73dd3fb77374a0adb9ce940b910e8a47bd517911659f50f9dee119a981dadc0427e8127d06e2022283c1b541e15438d70e32a02669
-
SSDEEP
24576:FREuSim93ySUIpLfaVSA72yK1/YppeCBRUwsAOIiT3lij76:FSzyb7F29pLl0m
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3064 Add2Reg.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 pdvserv.exe 2192 pdvserv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pdvserv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pdvserv.exe" Add2Reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvserv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 pdvserv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 pdvserv.exe 2192 pdvserv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3064 2192 pdvserv.exe 30 PID 2192 wrote to memory of 3064 2192 pdvserv.exe 30 PID 2192 wrote to memory of 3064 2192 pdvserv.exe 30 PID 2192 wrote to memory of 3064 2192 pdvserv.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\pdvserv.exe"C:\Users\Admin\AppData\Local\Temp\pdvserv.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Add2Reg.exe"C:\Users\Admin\AppData\Local\Temp\Add2Reg.exe" pdvserv=C:\Users\Admin\AppData\Local\Temp\pdvserv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5a111e43227d1138accd09c64764c8e24
SHA18a426c030057376f6b8955e7ece94656b93acb9a
SHA2560dbf5ef8ca3f25f7a0b91fd139157e6633de9f22cb2cd1c006df52e258124059
SHA512cd1bfaa144db9a697ae47a604f23daafc00eb0f10df4d200276d22329fc428953353315d942f669b138ce2f35ca4183b07855707ba265d23c5f24cfef8985f6e
-
Filesize
80KB
MD5088fda06e32f8d6eff8850a51b19c2a0
SHA1091bd5672805669baacc2f13c20eeeade03d7a53
SHA2566d448bcf7ebcf6d9224da1afa956b057fdec626f2cddeac0e4edf7bb1222a036
SHA51203d60afe1eee2401fd1e2dc67d964f945625f3e9d705a8713feb118e33029a39ede37a565e3f848d0f84cac3f11bdd35dd14e04c0efead92dea842fcaa1e8e14