Overview
overview
7Static
static
3559ebbaf83...18.exe
windows7-x64
7559ebbaf83...18.exe
windows10-2004-x64
7$APPDATA/p...fg.exe
windows7-x64
7$APPDATA/p...fg.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...lt.dll
windows7-x64
3$PLUGINSDI...lt.dll
windows10-2004-x64
3fbtoolbar.exe
windows7-x64
7fbtoolbar.exe
windows10-2004-x64
7uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
559ebbaf832a6edb5e15ad1f8fc952e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
559ebbaf832a6edb5e15ad1f8fc952e5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/pubgfx32cfg/pubgfx32cfg.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$APPDATA/pubgfx32cfg/pubgfx32cfg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/wuaclt.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/wuaclt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
fbtoolbar.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fbtoolbar.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
$APPDATA/pubgfx32cfg/pubgfx32cfg.exe
-
Size
257KB
-
MD5
058b152a63d1c2ba7987e7d03c7b5fcd
-
SHA1
3018ea4587064c68c2cfae997f9284f2bab53bba
-
SHA256
d679a848c521cb382d493f4df7621b2b41e4ab00f19eae205a05b45a762f8213
-
SHA512
3989320ff7a8a7abb1211fd5506e5fad1349aee3099381b4ce2c95e3aedede17802aafb039352cda51edf96335273795b111a160a6448ea474ab7df5406f24c2
-
SSDEEP
6144:HSQgmiNBOta44168rfP3oC4H0rjMw7QtaQrf/mrfhJJIw:HSQg/B4a4E7jSijMw7Q3rmrZJF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 pubgfx32cfg.exe -
Loads dropped DLL 3 IoCs
pid Process 1968 rundll32.exe 1968 rundll32.exe 1968 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2288 1968 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pubgfx32cfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pubgfx32cfg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4852 2740 pubgfx32cfg.exe 84 PID 2740 wrote to memory of 4852 2740 pubgfx32cfg.exe 84 PID 2740 wrote to memory of 4852 2740 pubgfx32cfg.exe 84 PID 4852 wrote to memory of 1968 4852 pubgfx32cfg.exe 85 PID 4852 wrote to memory of 1968 4852 pubgfx32cfg.exe 85 PID 4852 wrote to memory of 1968 4852 pubgfx32cfg.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\$APPDATA\pubgfx32cfg\pubgfx32cfg.exe"C:\Users\Admin\AppData\Local\Temp\$APPDATA\pubgfx32cfg\pubgfx32cfg.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Roaming\pubgfx32cfg\pubgfx32cfg.exeC:\Users\Admin\AppData\Roaming\pubgfx32cfg\pubgfx32cfg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\PUBGFX~1\PUBGFX~1.DLL 0003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 7444⤵
- Program crash
PID:2288
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1968 -ip 19681⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD5aa78ed264fbf2b71593bd97dc7758922
SHA1806d66feca44f1a819bb29a6df44837700cc86f2
SHA256ba248b004816e0a8de533fe5e760849e71da7326503d7c9bf3aa2538afb18c1e
SHA512b670f758eddf490a8bab8ada82b7e7763227d71b6f9293ba61388917c94ec4922cadb0f283f2e9d97d6390a3a2eee180951479987dc103f807634c3ec631d3ec
-
Filesize
160KB
MD5c2ee8ad0f858a05577ca88db711a8d5d
SHA1b02c6dabab9ed67178bc6686d7cdbc7c2c51d195
SHA25636ea9f03bb8f201f9b53503473c2b95ecc23c71944993f165963a9922d1d64a2
SHA5122a5da162b9271fdd75fd6cda24f349a1517ae4e40377438a312f2c100ad3d9016ecedb0e25a3978df950a124611fad5cd71f6f037b7c7857d091607d0a93358a
-
Filesize
257KB
MD5058b152a63d1c2ba7987e7d03c7b5fcd
SHA13018ea4587064c68c2cfae997f9284f2bab53bba
SHA256d679a848c521cb382d493f4df7621b2b41e4ab00f19eae205a05b45a762f8213
SHA5123989320ff7a8a7abb1211fd5506e5fad1349aee3099381b4ce2c95e3aedede17802aafb039352cda51edf96335273795b111a160a6448ea474ab7df5406f24c2