Overview
overview
10Static
static
7efc0cbb158...18.exe
windows7-x64
10efc0cbb158...18.exe
windows10-2004-x64
10MetroFramework.dll
windows7-x64
1MetroFramework.dll
windows10-2004-x64
1PS3Lib.dll
windows7-x64
1PS3Lib.dll
windows10-2004-x64
1Tool qM6wr...v1.exe
windows7-x64
7Tool qM6wr...v1.exe
windows10-2004-x64
7llk2.exe
windows7-x64
3llk2.exe
windows10-2004-x64
3Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 12:04
Behavioral task
behavioral1
Sample
efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MetroFramework.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
MetroFramework.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PS3Lib.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PS3Lib.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
Tool qM6wr Private v1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Tool qM6wr Private v1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
llk2.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
llk2.exe
Resource
win10v2004-20240802-en
General
-
Target
Tool qM6wr Private v1.exe
-
Size
28.9MB
-
MD5
90ca79ee599a1b09eb943920f3082c20
-
SHA1
0cc10d064322b98adcd51dad213c19d4f9098b15
-
SHA256
fa61d4fd3f67c8d1683a5690cf4b7a32aa45bb972fb72a16f8e8795fba9b408b
-
SHA512
2d8a6705416d83636210aa5995c4da698aa236657a3362f3ae0cb5a769a0fd952105d4e5925c7f8996a3bad9e157c128ee3cb8714470f51e72c9d7616122f204
-
SSDEEP
393216:Kyyhyp9FO5XQXQXUMSecOvuOvQkNSJW6sGfusGfusGfusGfusGfpcsjPqf72QaP0:Kyyh+hMSliSJWNG5G5G5G5GGnKGZ
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral8/memory/1616-5-0x0000000007150000-0x00000000071D0000-memory.dmp agile_net -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tool qM6wr Private v1.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1616 Tool qM6wr Private v1.exe 1616 Tool qM6wr Private v1.exe 1616 Tool qM6wr Private v1.exe 1616 Tool qM6wr Private v1.exe 1616 Tool qM6wr Private v1.exe 1616 Tool qM6wr Private v1.exe 1616 Tool qM6wr Private v1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1616 Tool qM6wr Private v1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tool qM6wr Private v1.exe"C:\Users\Admin\AppData\Local\Temp\Tool qM6wr Private v1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4212,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:3704