Overview
overview
7Static
static
344461b7121...18.exe
windows7-x64
744461b7121...18.exe
windows10-2004-x64
7$DOCUMENTS...HO.dll
windows7-x64
3$DOCUMENTS...HO.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3SpyDevastator.exe
windows7-x64
7SpyDevastator.exe
windows10-2004-x64
7msvcp71.dll
windows7-x64
3msvcp71.dll
windows10-2004-x64
3msvcr71.dll
windows7-x64
3msvcr71.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
44461b7121261330d0ab10a2b1bcda0b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44461b7121261330d0ab10a2b1bcda0b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$DOCUMENTS/SpyDevastator/SDBHO.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$DOCUMENTS/SpyDevastator/SDBHO.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ScriptReader.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ScriptReader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
SpyDevastator.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SpyDevastator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
msvcp71.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
msvcp71.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
msvcr71.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
msvcr71.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ScriptReader.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ScriptReader.dll
Resource
win10v2004-20241007-en
General
-
Target
SpyDevastator.exe
-
Size
2.0MB
-
MD5
9e7a8d40d6fb7ec75fe0d03eb1bfb9fd
-
SHA1
090b03610cdbcd0b244d3fb832b019e9a1e576a5
-
SHA256
167fff7cdde6f5a932415e7056a0f132f3bcad7fc6990b96f093d2772275c70a
-
SHA512
87c8446feaffd3b80c97a5e88aa36281b53b2bc3b5912acd411f146392e105a24473a07c788c07ec4a9f6afefba2f1c67f6f720ca0103998b0ced2db1434438c
-
SSDEEP
49152:CXcVQZEtb/qBtEHF4L9TzTik8VVYvUn4khNA2yyM1GYkWVvi:KcVQZEtjX4VzZ42vU4c62yF1GY54
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SpyDevastator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate SpyDevastator.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\madE274.tmp SpyDevastator.exe -
Suspicious use of SetThreadContext 31 IoCs
description pid Process procid_target PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 PID 2096 set thread context of 740 2096 SpyDevastator.exe 31 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\madE273.tmp SpyDevastator.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpyDevastator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpyDevastator.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SpyDevastator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SpyDevastator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SpyDevastator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier SpyDevastator.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26F094F0-D2BD-5F02-03AE-2232D5E967E0}\InprocServer32\ = "C:\\PROGRA~2\\COMMON~1\\MICROS~1\\OFFICE14\\MSO.DLL" SpyDevastator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26F094F0-D2BD-5F02-03AE-2232D5E967E0} SpyDevastator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26F094F0-D2BD-5F02-03AE-2232D5E967E0}\ = "Microsoft Office 14" SpyDevastator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26F094F0-D2BD-5F02-03AE-2232D5E967E0}\InprocServer32 SpyDevastator.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 740 SpyDevastator.exe Token: SeIncBasePriorityPrivilege 740 SpyDevastator.exe Token: 33 740 SpyDevastator.exe Token: SeIncBasePriorityPrivilege 740 SpyDevastator.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 740 SpyDevastator.exe 740 SpyDevastator.exe 740 SpyDevastator.exe 740 SpyDevastator.exe 740 SpyDevastator.exe 740 SpyDevastator.exe 740 SpyDevastator.exe 740 SpyDevastator.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2096 wrote to memory of 740 2096 SpyDevastator.exe 31 PID 2096 wrote to memory of 740 2096 SpyDevastator.exe 31 PID 2096 wrote to memory of 740 2096 SpyDevastator.exe 31 PID 2096 wrote to memory of 740 2096 SpyDevastator.exe 31 PID 2096 wrote to memory of 740 2096 SpyDevastator.exe 31 PID 2096 wrote to memory of 740 2096 SpyDevastator.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpyDevastator.exe"C:\Users\Admin\AppData\Local\Temp\SpyDevastator.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\SpyDevastator.exe"C:\Users\Admin\AppData\Local\Temp\SpyDevastator.exe"2⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5a7fe861054c97e385e7c56814504d4ef
SHA10d22a95e2716d8cb95043c490b84ac43c170bf94
SHA25697665bcdc9c3ae3cf3bce7485a659cd3005b0520e0874a580414449ff72417d0
SHA51264804f559af442e2c4d103eba374e6b79c0059a36d97b1c766e2695307f2c79f45e13b3155f8b5eb55216981629be0dde87e7828a1d87eff8f6aded83638ed84