Overview
overview
7Static
static
705c6488f0b...18.exe
windows7-x64
705c6488f0b...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3PIL._imaging.dll
windows7-x64
5PIL._imaging.dll
windows10-2004-x64
5README.html
windows7-x64
3README.html
windows10-2004-x64
3_hashlib.dll
windows7-x64
5_hashlib.dll
windows10-2004-x64
5_socket.dll
windows7-x64
5_socket.dll
windows10-2004-x64
5_ssl.dll
windows7-x64
5_ssl.dll
windows10-2004-x64
5bz2.dll
windows7-x64
5bz2.dll
windows10-2004-x64
5help.html
windows7-x64
3help.html
windows10-2004-x64
3msvcm90.dll
windows7-x64
5msvcm90.dll
windows10-2004-x64
5msvcp90.dll
windows7-x64
5msvcp90.dll
windows10-2004-x64
5msvcr90.dll
windows7-x64
5msvcr90.dll
windows10-2004-x64
5notewhal.exe
windows7-x64
6notewhal.exe
windows10-2004-x64
6Analysis
-
max time kernel
140s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 12:13
Behavioral task
behavioral1
Sample
05c6488f0b51d91f1c825e2d228c3857_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05c6488f0b51d91f1c825e2d228c3857_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
PIL._imaging.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
PIL._imaging.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
README.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
README.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
_hashlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
_hashlib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
_socket.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
_socket.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
_ssl.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
_ssl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
bz2.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
bz2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
help.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
help.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
msvcm90.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
msvcm90.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
msvcp90.dll
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
msvcp90.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
msvcr90.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
msvcr90.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
notewhal.exe
Resource
win7-20240903-en
General
-
Target
notewhal.exe
-
Size
1.7MB
-
MD5
c53716d88587975a32a6cebbb23c8377
-
SHA1
48b81ff67bb307ebc8656352e8ad22814c6234b7
-
SHA256
fcf9f0a45593686beeb19b7e99fbd1a7f50c7b57a1a9cdecd97e46f83398926a
-
SHA512
f44a2eb023db36a1be29ba324c1b34a7d4580de4543fefd9bf9c3be656245f602908be1e3b11a7377742c154ec62ee864bb92bb8f7cb8ddb2ca01cc1c6df6a06
-
SSDEEP
24576:ht8pWJHtOhlxP/TewLOfew2JG46O2pwlPM3IrrBsJsnUk27vikyK6VlN:EMHtwTe3feFE4dXlPM4rrBNL27U
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 5 bitbucket.org -
resource yara_rule behavioral32/memory/3976-0-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral32/memory/3976-1-0x000000001E000000-0x000000001E24E000-memory.dmp upx behavioral32/memory/3976-2-0x0000000010000000-0x0000000010058000-memory.dmp upx behavioral32/memory/3976-3-0x00000000030A0000-0x00000000031E3000-memory.dmp upx behavioral32/memory/3976-4-0x00000000031F0000-0x000000000345D000-memory.dmp upx behavioral32/memory/3976-5-0x00000000031F0000-0x0000000003389000-memory.dmp upx behavioral32/memory/3976-7-0x0000000000770000-0x00000000007A5000-memory.dmp upx behavioral32/memory/3976-6-0x00000000031F0000-0x0000000003782000-memory.dmp upx behavioral32/memory/3976-8-0x0000000003460000-0x00000000035F9000-memory.dmp upx behavioral32/memory/3976-9-0x0000000003600000-0x0000000003B92000-memory.dmp upx behavioral32/memory/3976-10-0x00000000031F0000-0x000000000345D000-memory.dmp upx behavioral32/memory/3976-13-0x0000000004570000-0x0000000004634000-memory.dmp upx behavioral32/memory/3976-12-0x0000000004480000-0x0000000004567000-memory.dmp upx behavioral32/memory/3976-11-0x0000000003BA0000-0x0000000003C7C000-memory.dmp upx behavioral32/memory/3976-17-0x0000000004640000-0x000000000476F000-memory.dmp upx behavioral32/memory/3976-20-0x0000000004770000-0x000000000483C000-memory.dmp upx behavioral32/memory/3976-19-0x0000000004770000-0x000000000483C000-memory.dmp upx behavioral32/memory/3976-18-0x0000000004640000-0x000000000476F000-memory.dmp upx behavioral32/memory/3976-16-0x0000000004480000-0x0000000004567000-memory.dmp upx behavioral32/memory/3976-15-0x0000000003BA0000-0x0000000003C7C000-memory.dmp upx behavioral32/memory/3976-14-0x00000000030A0000-0x00000000031E3000-memory.dmp upx behavioral32/memory/3976-27-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral32/memory/3976-26-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx behavioral32/memory/3976-25-0x0000000004C10000-0x0000000004CF6000-memory.dmp upx behavioral32/memory/3976-24-0x0000000004B20000-0x0000000004C03000-memory.dmp upx behavioral32/memory/3976-23-0x0000000002340000-0x000000000238F000-memory.dmp upx behavioral32/memory/3976-22-0x0000000004840000-0x00000000048FD000-memory.dmp upx behavioral32/memory/3976-21-0x00000000022B0000-0x00000000022C0000-memory.dmp upx behavioral32/memory/3976-28-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral32/memory/3976-29-0x000000001E000000-0x000000001E24E000-memory.dmp upx behavioral32/memory/3976-30-0x0000000003460000-0x00000000035F9000-memory.dmp upx behavioral32/memory/3976-31-0x0000000010000000-0x0000000010058000-memory.dmp upx behavioral32/memory/3976-32-0x00000000030A0000-0x00000000031E3000-memory.dmp upx behavioral32/memory/3976-33-0x00000000031F0000-0x000000000345D000-memory.dmp upx behavioral32/memory/3976-34-0x0000000003BA0000-0x0000000003C7C000-memory.dmp upx behavioral32/memory/3976-35-0x00000000031F0000-0x0000000003782000-memory.dmp upx behavioral32/memory/3976-38-0x0000000004570000-0x0000000004634000-memory.dmp upx behavioral32/memory/3976-36-0x0000000003600000-0x0000000003B92000-memory.dmp upx behavioral32/memory/3976-37-0x0000000004480000-0x0000000004567000-memory.dmp upx behavioral32/memory/3976-39-0x0000000004640000-0x000000000476F000-memory.dmp upx behavioral32/memory/3976-40-0x0000000004770000-0x000000000483C000-memory.dmp upx behavioral32/memory/3976-62-0x0000000004840000-0x00000000048FD000-memory.dmp upx behavioral32/memory/3976-61-0x00000000022B0000-0x00000000022C0000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notewhal.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3976 notewhal.exe 3976 notewhal.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3976 notewhal.exe 3976 notewhal.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3976 notewhal.exe 3976 notewhal.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3976 notewhal.exe 3976 notewhal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\notewhal.exe"C:\Users\Admin\AppData\Local\Temp\notewhal.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3976