Overview
overview
7Static
static
3ea89cef767...18.exe
windows7-x64
7ea89cef767...18.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/nsisos.dll
windows7-x64
3$TEMP/nsisos.dll
windows10-2004-x64
3Boan119.exe
windows7-x64
3Boan119.exe
windows10-2004-x64
7Boan119Mon.exe
windows7-x64
3Boan119Mon.exe
windows10-2004-x64
3Boan119cfg.exe
windows7-x64
3Boan119cfg.exe
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
ea89cef767b32a7ccc16f27c41722f92_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea89cef767b32a7ccc16f27c41722f92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExLicenseBoan119Page.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExLicenseBoan119Page.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/nsisos.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/nsisos.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Boan119.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Boan119.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Boan119Mon.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Boan119Mon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Boan119cfg.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Boan119cfg.exe
Resource
win10v2004-20240802-en
General
-
Target
Boan119.exe
-
Size
5.4MB
-
MD5
dfbb612a851978d0f1524a66cb5236a2
-
SHA1
f890de9c8d37442a4f0e326b65d251075d689207
-
SHA256
c154c544182c6be535b1fd9d5c6d8ba2890cee33772af43aa852e9cf40ff44f2
-
SHA512
5c3506ff590c3374dac7f413929301d985969ec6d653694024f64f358a124515c7bfcf9df5c0169ee712d8bdb536d50d0260aa105b8fecfd8be77604926cbf5f
-
SSDEEP
12288:yjaO0RK5bsmCbSmSyU9L6Lp232qfQ+bDV1x7o7PlhoWnmnxukiskfqm8Vk:yuO8E63+bDy7Plaxukiskfq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation Boan119.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boan119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boan119cfg.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1440 Boan119cfg.exe 1440 Boan119cfg.exe 1440 Boan119cfg.exe 1440 Boan119cfg.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1440 Boan119cfg.exe 1440 Boan119cfg.exe 1440 Boan119cfg.exe 1440 Boan119cfg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2988 Boan119.exe 1440 Boan119cfg.exe 1440 Boan119cfg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1440 2988 Boan119.exe 81 PID 2988 wrote to memory of 1440 2988 Boan119.exe 81 PID 2988 wrote to memory of 1440 2988 Boan119.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Boan119.exe"C:\Users\Admin\AppData\Local\Temp\Boan119.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Boan119cfg.exe"C:\Users\Admin\AppData\Local\Temp\Boan119cfg.exe" /run02⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1440
-