Overview
overview
10Static
static
10fa2f3ffb34...18.exe
windows7-x64
10fa2f3ffb34...18.exe
windows10-2004-x64
10$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
5$PLUGINSDI...on.dll
windows10-2004-x64
5Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 09:50
Behavioral task
behavioral1
Sample
fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IceDragonPlugin.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IceDragonPlugin.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSIS_SkinCrafter_Plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSIS_SkinCrafter_Plugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/version.dll
Resource
win7-20240708-en
General
-
Target
fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe
-
Size
8.8MB
-
MD5
fa2f3ffb34db747f9e0f71db54366828
-
SHA1
bce3c4f26fe9620689bd789eb289bddb95b13c07
-
SHA256
7a9c0e726aa4db17aeec45f63425219a098756dc6a434c084853c98e3d4ec9eb
-
SHA512
44d22f63e5d8bea4411da3d3f224fc468b798032b967ac73ec38cdb14bd6f5bab7014b2e82aad442cba302b60b5f18e1df3d1f49c54c60dee44c5e4dee6d7dde
-
SSDEEP
196608:64wb69bPe3Fd+FPhQVjFA7t2RHfYlQZJgTamGcBiG:64AqL7h6AWHf3A
Malware Config
Signatures
-
Detects Strela Stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016db5-2.dat family_strela behavioral1/files/0x0007000000016edb-17.dat family_strela -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gdiplus.dll Au_.exe File created C:\Windows\SysWOW64\msvcr71.dll Au_.exe File created C:\Windows\SysWOW64\mfc71.dll Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 Au_.exe -
Loads dropped DLL 8 IoCs
pid Process 1732 fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe 2688 Au_.exe 2688 Au_.exe 2688 Au_.exe 2688 Au_.exe 2688 Au_.exe 2688 Au_.exe 2688 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016db5-2.dat nsis_installer_1 behavioral1/files/0x0009000000016db5-2.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2688 Au_.exe 2688 Au_.exe 2688 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2688 1732 fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2688 1732 fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2688 1732 fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2688 1732 fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740B
MD5cb5adee102268bf91bcca637afbc1ffd
SHA11c7d905eeade0510d350206f6ff32a2c8920b58d
SHA25653c0db610c388ccd7931147c292e0069540300f9655b9ad387290ea105904304
SHA512c9744423ba37ad8a727b3b351d95585ba63941349c641aaa5b61eeacc71743a56c9c93ecb3208fe926798d6577b877eabe0fb5538c516e95a4de97ffdaefe7da
-
Filesize
660B
MD59394cd17f501b9abda76c34a84ff7398
SHA15fabd3d206521108e565fb5dd6672cd1bb2f068e
SHA256bbcb8b1a2f296cbcb5d18291d917032f0a6224c5db6e44d36f4f90c65d7e0f0c
SHA5120c16eb6af06e807dfd0c0faa9d87d69824dabd9b8dab1a9e0e5db5b262b903485ce3ea7b19e832b0a6cf19dd3ca9bf8f07716df2b33e4fdbd69ba7374569f450
-
Filesize
2.1MB
MD50f5f24058e46a85d65f35d856e063ddb
SHA15dbefd4a5705c9edaa85c930b297929fd9abb2ba
SHA256e01e1e6d73392a90973e60d384c88855de05f8024c76ab1a94229a87191f2029
SHA512636653a1a98715d58b8b7a1be917dc470f9c660f75710908cb3caa9c03d2a9b5b3bc6fa0514a28d18873df39aa18151417bdb55e0e655ee21fb1595cf6a9830d
-
Filesize
14KB
MD54cb36c62157fe5bf48aa7f20bc0a9eb0
SHA1ca194fb9ab75fbf23a0eb0814fd44996b5959210
SHA256a4774fa2602702951839d3d3a593f3b39e71e14c3fbab77bf6274935924d755b
SHA512fd141c0b8ead070b2b266344ad6e804df24a2dd578f78285ece6e003de35b4dfdac1ebbcc0ce2ca6f0a4e5673fc0e26639dcc5073e4e474d4ddcca9c6f978cdd
-
Filesize
5.8MB
MD5bad139a2d8491896ce10ee8e4e55a921
SHA14346289950aa9b547d96553ced684b6a05af0234
SHA256363e9c63b62d61ff3dd5f3cb1de5d9c2320c95787ae0a30035c19f01adebb0c3
SHA5127ba1908909237986c573244743f4632dde72da9f708c151879102633f7bd7cffbaf1f79b3bb3797952304248aae9dd984f6a07a9dbf6433cc5b2d7f72ee80e15
-
Filesize
792KB
MD58fea8fd177034b52e6a5886fb5e780bd
SHA199f511388a2420d53b8406baed48ba550842eaad
SHA256546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de
SHA5125d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696
-
Filesize
11KB
MD54d3b19a81bd51f8ce44b93643a4e3a99
SHA135f8b00e85577b014080df98bd2c378351d9b3e9
SHA256fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
SHA512b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
Filesize
8.8MB
MD5fa2f3ffb34db747f9e0f71db54366828
SHA1bce3c4f26fe9620689bd789eb289bddb95b13c07
SHA2567a9c0e726aa4db17aeec45f63425219a098756dc6a434c084853c98e3d4ec9eb
SHA51244d22f63e5d8bea4411da3d3f224fc468b798032b967ac73ec38cdb14bd6f5bab7014b2e82aad442cba302b60b5f18e1df3d1f49c54c60dee44c5e4dee6d7dde
-
Filesize
1.0MB
MD51fd3f9722119bdf7b8cff0ecd1e84ea6
SHA19a4faa258b375e173feaca91a8bd920baf1091eb
SHA256385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823
SHA512109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6
-
Filesize
340KB
MD5ca2f560921b7b8be1cf555a5a18d54c3
SHA1432dbcf54b6f1142058b413a9d52668a2bde011d
SHA256c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb
SHA51223e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e