Overview
overview
7Static
static
3ef4d5740e0...18.exe
windows7-x64
7ef4d5740e0...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$TEMP/spltmp.exe
windows7-x64
1$TEMP/spltmp.exe
windows10-2004-x64
3Mwic_32.dll
windows7-x64
3Mwic_32.dll
windows10-2004-x64
3POS58/pos5...DD.dll
windows7-x64
3POS58/pos5...DD.dll
windows10-2004-x64
3POS58/pos5...UI.dll
windows7-x64
3POS58/pos5...UI.dll
windows10-2004-x64
3POS58/pos5...58.dll
windows7-x64
3POS58/pos5...58.dll
windows10-2004-x64
3POS58/pos5...OR.dll
windows7-x64
1POS58/pos5...OR.dll
windows10-2004-x64
1POS58/pos5...IB.dll
windows7-x64
1POS58/pos5...IB.dll
windows10-2004-x64
1POS58/pos5...RV.dll
windows7-x64
1POS58/pos5...RV.dll
windows10-2004-x64
1RWic.dll
windows7-x64
3RWic.dll
windows10-2004-x64
3mpok.exe
windows7-x64
5mpok.exe
windows10-2004-x64
5readme.htm
windows7-x64
3readme.htm
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:15
Static task
static1
Behavioral task
behavioral1
Sample
ef4d5740e0152c792d763c4053d4e861_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef4d5740e0152c792d763c4053d4e861_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/spltmp.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/spltmp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Mwic_32.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Mwic_32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
POS58/pos58_2000_xp/I386/RASDD.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
POS58/pos58_2000_xp/I386/RASDD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
POS58/pos58_2000_xp/I386/RASDDUI.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
POS58/pos58_2000_xp/I386/RASDDUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
POS58/pos58_2000_xp/POS58.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
POS58/pos58_2000_xp/POS58.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
POS58/pos58_win98/DMCOLOR.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
POS58/pos58_win98/DMCOLOR.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
POS58/pos58_win98/ICONLIB.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
POS58/pos58_win98/ICONLIB.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
POS58/pos58_win98/UNIDRV.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
POS58/pos58_win98/UNIDRV.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
RWic.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
RWic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
mpok.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
mpok.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
readme.htm
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
readme.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
mpok.exe
-
Size
1.8MB
-
MD5
2328c72d32da72f31b51d0797cb9ccaf
-
SHA1
5cd63580b5347d3fb867cb247906d046d606832b
-
SHA256
883f5c8fad45aaf1c3d3576674592a8ea73040dd156dc6b5413ae2a3a147d9a9
-
SHA512
3015172e34ab7ba5615fad97e5d7aee496e06e857fa75b194398a88a33c5430e6c04e2c5d6152eecfac4ac85b0faa01c3e34bf9e1e89fd61148143ed0a99ae68
-
SSDEEP
49152:o9IeX5F/R/o6/cx4AGMKPMqV43Jf4Ms9MZJkjF:cz/R/oOAE0qgJf14M6F
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\syst.txt mpok.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mpok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2644 1716 mpok.exe 28 PID 1716 wrote to memory of 2644 1716 mpok.exe 28 PID 1716 wrote to memory of 2644 1716 mpok.exe 28 PID 1716 wrote to memory of 2644 1716 mpok.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\mpok.exe"C:\Users\Admin\AppData\Local\Temp\mpok.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5bd72dcf1083b6e22ccbfa0e8e27fb1e0
SHA13fd23d4f14da768da7b8364d74c54932d704e74e
SHA25690f44f69950a796ab46ff09181585ac9dabf21271f16ebb9ea385c957e5955c1
SHA51272360ab4078ad5e0152324f9a856b3396e2d0247f7f95ac8a5a53a25126ac3cff567cc523849e28d92a99730ee8ffb30366f09c428258f93a5cca6d0c5905562