Overview
overview
7Static
static
705d550c182...18.exe
windows7-x64
305d550c182...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/exdll.dll
windows7-x64
3$PLUGINSDIR/exdll.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3content/ctoolbar.js
windows7-x64
3content/ctoolbar.js
windows10-2004-x64
3$_7_/compo...uit.js
windows7-x64
3$_7_/compo...uit.js
windows10-2004-x64
3$_7_/compo...rch.js
windows7-x64
3$_7_/compo...rch.js
windows10-2004-x64
3$_7_/compo...bar.js
windows7-x64
3$_7_/compo...bar.js
windows10-2004-x64
3$_7_/compo...rt.dll
windows7-x64
3$_7_/compo...rt.dll
windows10-2004-x64
3$_7_/compo...ax.dll
windows7-x64
3$_7_/compo...ax.dll
windows10-2004-x64
3$_7_/compo...icy.js
windows7-x64
3$_7_/compo...icy.js
windows10-2004-x64
3$_7_/lib/xpcom.js
windows7-x64
3$_7_/lib/xpcom.js
windows10-2004-x64
3bplay.exe
windows7-x64
5bplay.exe
windows10-2004-x64
5bslib/bslib.dll
windows7-x64
5bslib/bslib.dll
windows10-2004-x64
5bspcodecdl.exe
windows7-x64
5bspcodecdl.exe
windows10-2004-x64
5Analysis
-
max time kernel
141s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 12:33
Behavioral task
behavioral1
Sample
05d550c182312f5a0580eafa2fbba806_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05d550c182312f5a0580eafa2fbba806_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/exdll.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/exdll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
content/ctoolbar.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
content/ctoolbar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$_7_/components/Conduit.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$_7_/components/Conduit.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$_7_/components/ConduitAutoCompleteSearch.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$_7_/components/ConduitAutoCompleteSearch.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$_7_/components/ConduitToolbar.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$_7_/components/ConduitToolbar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$_7_/components/FFAlert.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_7_/components/FFAlert.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$_7_/components/npmozax.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$_7_/components/npmozax.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$_7_/components/nsAxSecurityPolicy.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$_7_/components/nsAxSecurityPolicy.js
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
$_7_/lib/xpcom.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$_7_/lib/xpcom.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bplay.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
bplay.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
bslib/bslib.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
bslib/bslib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
bspcodecdl.exe
Resource
win7-20240903-en
General
-
Target
bplay.exe
-
Size
12KB
-
MD5
e057aa4a56a9a2a628a8053f25a27d7d
-
SHA1
d839e5258bbdb871c746c2cef52e336487535c47
-
SHA256
2519081eca56fadcf3b62e7cb22e55a1f839b9055e9f1e404fc28145d149e913
-
SHA512
d968aa76b1483a14b7d829c755a99c7ad09163d18da6806f23b3a33664292f16a4695b596b0d2be619a3b6dc909cfcb8cb7ff236641d1cc012e4f438364945e7
-
SSDEEP
384:azbge2/99IpWUFyCKaMgXGT/bl55oqyfvN:azb619IpWUFyQiB55aH
Malware Config
Signatures
-
resource yara_rule behavioral27/memory/3052-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral27/memory/3052-2-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral27/memory/3004-3-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-5-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-6-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-7-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-11-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-12-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-15-0x0000000007100000-0x00000000072E3000-memory.dmp upx behavioral27/memory/3004-16-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-17-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-18-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-21-0x0000000007100000-0x00000000072E3000-memory.dmp upx behavioral27/memory/3004-19-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-22-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-23-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-24-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-27-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-30-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-33-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-36-0x0000000000400000-0x00000000009FE000-memory.dmp upx behavioral27/memory/3004-39-0x0000000000400000-0x00000000009FE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bplay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsplayer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3004 bsplayer.exe 3004 bsplayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 bsplayer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3004 bsplayer.exe Token: SeSecurityPrivilege 3004 bsplayer.exe Token: SeLoadDriverPrivilege 3004 bsplayer.exe Token: SeSystemProfilePrivilege 3004 bsplayer.exe Token: SeSystemtimePrivilege 3004 bsplayer.exe Token: SeProfSingleProcessPrivilege 3004 bsplayer.exe Token: SeIncBasePriorityPrivilege 3004 bsplayer.exe Token: SeCreatePagefilePrivilege 3004 bsplayer.exe Token: SeShutdownPrivilege 3004 bsplayer.exe Token: SeDebugPrivilege 3004 bsplayer.exe Token: SeSystemEnvironmentPrivilege 3004 bsplayer.exe Token: SeRemoteShutdownPrivilege 3004 bsplayer.exe Token: SeUndockPrivilege 3004 bsplayer.exe Token: SeManageVolumePrivilege 3004 bsplayer.exe Token: 33 3004 bsplayer.exe Token: 34 3004 bsplayer.exe Token: 35 3004 bsplayer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3004 bsplayer.exe 3004 bsplayer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3004 3052 bplay.exe 30 PID 3052 wrote to memory of 3004 3052 bplay.exe 30 PID 3052 wrote to memory of 3004 3052 bplay.exe 30 PID 3052 wrote to memory of 3004 3052 bplay.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bplay.exe"C:\Users\Admin\AppData\Local\Temp\bplay.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\bsplayer.exe"C:\Users\Admin\AppData\Local\Temp\bsplayer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3004
-