Overview
overview
7Static
static
319c67d5276...18.exe
windows7-x64
719c67d5276...18.exe
windows10-2004-x64
7$PLUGINSDI...ft.jar
windows7-x64
1$PLUGINSDI...ft.jar
windows10-2004-x64
6$PLUGINSDIR/7za.exe
windows7-x64
3$PLUGINSDIR/7za.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
19c67d5276ed9ef7334390fe4c179afb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19c67d5276ed9ef7334390fe4c179afb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/$APPDATA/.minecraft/bin/minecraft.jar
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/$APPDATA/.minecraft/bin/minecraft.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/7za.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/$APPDATA/.minecraft/bin/minecraft.jar
-
Size
5.3MB
-
MD5
c79b8234a7a3e8e457ac6e37c478691f
-
SHA1
ca3b2e326f463a55895e5bbe993c64d6d4149dd2
-
SHA256
e6fe6ab535b924ab2b519916423a8b583ad9ba7535852346516bbf9d6b2a0a91
-
SHA512
8f7d9e4a23b6712e1bae2ad36cfce23e7d8a78108f0dde1eed1dcfcfeac7f4c191440621ecf43919cab7f29d29bf1db8a83a1f8530b7b5f779c8dd535b982545
-
SSDEEP
98304:DD13dBsS2ZuMUsMupN4QVbcoh+w7SpzUH1DxMBdBAHXacx8bJGGG24XZUp1Pit8F:Dh3V2kj6+weGkdBARgJmXqPi+nN6k
Malware Config
Signatures
-
Processes:
GameBarPresenceWriter.exepid process 1244 GameBarPresenceWriter.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-786284298-625481688-3210388970-1000\{61E5F5AB-B569-4091-8C63-604A9DE2114F} svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4756 OpenWith.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\$APPDATA\.minecraft\bin\minecraft.jar1⤵PID:4512
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:1244
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3468