Overview
overview
7Static
static
517cb2b86c5...18.exe
windows7-x64
717cb2b86c5...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7zcodec.exe
windows7-x64
7zcodec.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 10:53
Behavioral task
behavioral1
Sample
17cb2b86c5acea353e47ecc7ff67039b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17cb2b86c5acea353e47ecc7ff67039b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Loader.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Loader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
zcodec.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
zcodec.exe
Resource
win10v2004-20240802-en
General
-
Target
zcodec.exe
-
Size
24KB
-
MD5
3c5d65163ae64c0cb3a5177b3f1676ed
-
SHA1
c743fdb4a494a8a9a099a5b7aa70fddcf1dde960
-
SHA256
468695f88f69c636be9538f3d3cc74cd6d8ca9cb116af68dddd8c95b707711fb
-
SHA512
5ae43a192040f6eb12c28a8d310c5fa92d4edadcb9edb32c124ed00b353fcb4600b50240285ff6c4590a83d890d45b0c5c7323f04961f3a056afa8477e575afd
-
SSDEEP
768:tmyWdNYzpVOtDawJxP/H4RbloY2wBQqlkGY:cDYdIDa0RvoZoYhhO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 regperf.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 zcodec.exe 2192 zcodec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\regperf.exe zcodec.exe File opened for modification C:\Windows\SysWOW64\regperf.exe zcodec.exe File created C:\Windows\SysWOW64\ld100.tmp regperf.exe File opened for modification C:\Windows\SysWOW64\ld100.tmp regperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zcodec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regperf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2080 regperf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2192 zcodec.exe Token: SeDebugPrivilege 2080 regperf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2192 zcodec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2080 2192 zcodec.exe 28 PID 2192 wrote to memory of 2080 2192 zcodec.exe 28 PID 2192 wrote to memory of 2080 2192 zcodec.exe 28 PID 2192 wrote to memory of 2080 2192 zcodec.exe 28 PID 2080 wrote to memory of 432 2080 regperf.exe 5 PID 2192 wrote to memory of 2768 2192 zcodec.exe 29 PID 2192 wrote to memory of 2768 2192 zcodec.exe 29 PID 2192 wrote to memory of 2768 2192 zcodec.exe 29 PID 2192 wrote to memory of 2768 2192 zcodec.exe 29
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\zcodec.exe"C:\Users\Admin\AppData\Local\Temp\zcodec.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\regperf.exeC:\Windows\system32\regperf.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\zcodec.exe > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5450ea55d47e24bc8d1be99c710816cd3
SHA1f1f576f7ceae459b1670748dbf9a58169e9465a7
SHA2567ed1b483b66c30eee4f2103ccf3786f0fa5e552ac6c3c1460fa23105276f8f99
SHA51254d856afa6a39ad4fbf0469d98305c8edecca47ebd45e3edebaace5a676ca50df3a2fe766a1084c402e3fcb2d0a6bf9173d34236d06f844da7b2691f6ebd7538