Overview
overview
7Static
static
3f6ee676bbc...18.exe
windows7-x64
3f6ee676bbc...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3ecodec.exe
windows7-x64
7ecodec.exe
windows10-2004-x64
7uninst.exe
windows7-x64
3uninst.exe
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
f6ee676bbc20a7fcbde856fd1576a5b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6ee676bbc20a7fcbde856fd1576a5b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Loader.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Loader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ecodec.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ecodec.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
ecodec.exe
-
Size
20KB
-
MD5
1a903452323d53dcdde9f84b9c861cfd
-
SHA1
fd0c5332f18e813676165f3b50cac61d5b9305e3
-
SHA256
9b3d972e15b625367e7737238891a789fe98e99c6a03faa25bd67d16459e59a5
-
SHA512
a7d71d8f41102a09126976e96409a0ca8c0ebe664378ca781cd9ccd631ad156e2a8e80ef3daeeb4f6ec49188022eb56a01e534ce76b0ae47f4190585d0aac785
-
SSDEEP
384:IibhcmwBpLN4o47+7CLm+fUnzIxLFSNQHVOc2oOrmydA/y9yL4/AjtXdwY:Ii9AGsh+fUUxwQgc8fP9k3jwY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation ecodec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecodec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4936 ecodec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3280 4936 ecodec.exe 82 PID 4936 wrote to memory of 3280 4936 ecodec.exe 82 PID 4936 wrote to memory of 3280 4936 ecodec.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecodec.exe"C:\Users\Admin\AppData\Local\Temp\ecodec.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\ecodec.exe > nul2⤵
- System Location Discovery: System Language Discovery
PID:3280
-