Overview
overview
10Static
static
10723a69df9c...18.exe
windows7-x64
7723a69df9c...18.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
3$PLUGINSDI...nd.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3$TEMP/K8Skin.dll
windows7-x64
3$TEMP/K8Skin.dll
windows10-2004-x64
3FFC11.dll
windows7-x64
3FFC11.dll
windows10-2004-x64
3Monster Tr...le.exe
windows7-x64
10Monster Tr...le.exe
windows10-2004-x64
10text/truck...ht.ps1
windows7-x64
3text/truck...ht.ps1
windows10-2004-x64
3text/truck...le.ps1
windows7-x64
3text/truck...le.ps1
windows10-2004-x64
3text/truck...mg.ps1
windows7-x64
3text/truck...mg.ps1
windows10-2004-x64
3General
-
Target
723a69df9c1ba18ca42f48067bcc3c43_JaffaCakes118
-
Size
26.1MB
-
Sample
241024-ej1aaavgln
-
MD5
723a69df9c1ba18ca42f48067bcc3c43
-
SHA1
8b061eaeec190dc7c43d2ff79b6aa3baea8de656
-
SHA256
4f3cbd590058bf2e510c217fb60cb8ac5d39e661106eb84216df3761c24c46c0
-
SHA512
462ff8989f5fddc5c01c1b191c38678d966f96b9ee12cd9c608a6501ad183c5af70e3b7dc88bf760b104adc59234249a66219078e23326b1d9980b30487777f7
-
SSDEEP
786432:bWKdCdOikWfieX4zdg0CewOCpnUZrabI5WF80QaRL:vdCd1kW/cd0pbbICVV
Behavioral task
behavioral1
Sample
723a69df9c1ba18ca42f48067bcc3c43_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
723a69df9c1ba18ca42f48067bcc3c43_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/K8NsisExtend.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/K8NsisExtend.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$TEMP/K8Skin.dll
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
$TEMP/K8Skin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
FFC11.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
FFC11.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Monster Truck Rumble.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Monster Truck Rumble.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
text/trucks/DarkKnight.ps1
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
text/trucks/DarkKnight.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
text/trucks/SergeantSteele.ps1
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
text/trucks/SergeantSteele.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
text/trucks/SergeantSteele_dmg.ps1
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
text/trucks/SergeantSteele_dmg.ps1
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
723a69df9c1ba18ca42f48067bcc3c43_JaffaCakes118
-
Size
26.1MB
-
MD5
723a69df9c1ba18ca42f48067bcc3c43
-
SHA1
8b061eaeec190dc7c43d2ff79b6aa3baea8de656
-
SHA256
4f3cbd590058bf2e510c217fb60cb8ac5d39e661106eb84216df3761c24c46c0
-
SHA512
462ff8989f5fddc5c01c1b191c38678d966f96b9ee12cd9c608a6501ad183c5af70e3b7dc88bf760b104adc59234249a66219078e23326b1d9980b30487777f7
-
SSDEEP
786432:bWKdCdOikWfieX4zdg0CewOCpnUZrabI5WF80QaRL:vdCd1kW/cd0pbbICVV
Score7/10-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/ButtonEvent.dll
-
Size
4KB
-
MD5
fad9d09fc0267e8513b8628e767b2604
-
SHA1
bea76a7621c07b30ed90bedef4d608a5b9e15300
-
SHA256
5d913c6be9c9e13801acc5d78b11d9f3cd42c1b3b3cad8272eb6e1bfb06730c2
-
SHA512
b39c5ea8aea0640f5a32a1fc03e8c8382a621c168980b3bc5e2897932878003b2b8ef75b3ad68149c35420d652143e2ef763b6a47d84ec73621017f0273e2805
Score3/10 -
-
-
Target
$PLUGINSDIR/DcryptDll.dll
-
Size
14KB
-
MD5
904beebec2790ee2ca0c90fc448ac7e0
-
SHA1
40fabf1eb0a3b7168351c4514c5288216cb1566d
-
SHA256
f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222
-
SHA512
8bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa
-
SSDEEP
192:apY9VuCnNCbs8dNyHdrvr5T1KEtx/9ehuhiDTUkSv/DxRyeHk51I7n13Xm:aptMNUjyVvGWxauhiDDS3DnyK7nF
Score3/10 -
-
-
Target
$PLUGINSDIR/K8NsisExtend.dll
-
Size
180KB
-
MD5
bb2a8e03b4e1513a9a3b53a781944463
-
SHA1
d92d9a38c426038f3f7c1c7b2b8db1ac7d41458e
-
SHA256
a5316412cd439f8c3e65c5287c8199d1a8e0b5c9a326235cbe591a208318fb0b
-
SHA512
cef2b8dd42f4d4f4c3fd2c13f2f58a202ece732356a2f123cabee3e6d948aa2ac5c0ca30af10c896ddbf67f1503e1ce8f54ed8718ab6bf8a450ccc22de34dc4f
-
SSDEEP
3072:/EFlE9e/sdrFv7cKMW/qUNKByp+JZ4k4nxS1qUipfJ0PVLDtU3Dg:sv/u5v7cKbNm8nxwqUihsVLus
Score3/10 -
-
-
Target
$PLUGINSDIR/NSISdl.dll
-
Size
14KB
-
MD5
254f13dfd61c5b7d2119eb2550491e1d
-
SHA1
5083f6804ee3475f3698ab9e68611b0128e22fd6
-
SHA256
fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
-
SHA512
fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
SSDEEP
192:t5ZTobBDJ68r67wmsvJI5ad9cXzFOVu+mZ/P3p+57CvpVqDxVp01Dwn2GRYgsfA:fBo/680dCI5adOjFOg9//p27uNw2bo
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
00a0194c20ee912257df53bfe258ee4a
-
SHA1
d7b4e319bc5119024690dc8230b9cc919b1b86b2
-
SHA256
dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
-
SHA512
3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
SSDEEP
192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
Score3/10 -
-
-
Target
$PLUGINSDIR/locate.dll
-
Size
17KB
-
MD5
7d3317f57c1a368480ace3c0ca804eeb
-
SHA1
d4c7e185bc64aac82339f51ba6c21cf0713c9f1a
-
SHA256
d88a04c1e39db583eaad727fd390fe599ab10198ee040bfbdd22daefadbd2372
-
SHA512
5598c2e6caa2f66edd48f8c8305e054d4b0740b5f2b7ed92cf197a13ac66ba99a32013d34b3c2e28d007ab7979eb90a50681324eb736b1410e7df1902e4ec32a
-
SSDEEP
384:ev/vPBkA6dK8wiLe45naPji7hpx2kRV+qgm:evyvwiNnGji7Xxjc8
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
ab73c0c2a23f913eabdc4cb24b75cbad
-
SHA1
6569d2863d54c88dcf57c843fc310f6d9571a41e
-
SHA256
3d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457
-
SHA512
99d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8
-
SSDEEP
96:EBABCcnl5TKhkfLxSslykcxM2DjDf3GE+Xv8Xav+Yx4MndY7ndS27gA:E6n+0SAfRE+/8ZYxldqn420
Score3/10 -
-
-
Target
$PLUGINSDIR/nsRandom.dll
-
Size
21KB
-
MD5
ab467b8dfaa660a0f0e5b26e28af5735
-
SHA1
596abd2c31eaff3479edf2069db1c155b59ce74d
-
SHA256
db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73
-
SHA512
7d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301
-
SSDEEP
384:LCHDPMs4GdtyO5roguusMxUXiO3wOw95euooP2UgKbd9BvNtf:LCHD6Gh87MKXil/5r2U3z
-
-
-
Target
$PLUGINSDIR/xml.dll
-
Size
118KB
-
MD5
42df1fbaa87567adf2b4050805a1a545
-
SHA1
b892a6efbb39b7144248e0c0d79e53da474a9373
-
SHA256
e900fcb9d598643eb0ee3e4005da925e73e70dbaa010edc4473e99ea0638b845
-
SHA512
4537d408e2f54d07b018907c787da6c7340f909a1789416de33d090055eda8918f338d8571bc3b438dd89e5e03e0ded70c86702666f12adb98523a91cbb1de1d
-
SSDEEP
1536:U2A8OSGjylgkara+70LICin9zgtg2LxowhtJu6MqSNicNEtIfF42q2KC:OzjLkarn7O+n9z2L6whFtGF42bK
Score3/10 -
-
-
Target
$TEMP/K8Skin.dll
-
Size
200KB
-
MD5
993769b2dfcd636e44d1b172153e93cd
-
SHA1
9f50f10b368d1aa5a3c0b62b186e17bfdc777bb4
-
SHA256
87ef39ea75bfaa0df277bbc838b57449c7fdc2d4d0512f8eade3ff8f1be4e9e7
-
SHA512
5de33a662cbc368a35784e05b4ce99a5fa1db94f92724eea763bd3cf000a25adaeb85903057ca4e27fc28110cd476a1d627f142894754d7dfea048f4a57f3277
-
SSDEEP
3072:rGse0Myun/49yEUBdWYnFCBC19Md/ZVvcgqxdgD+PCnATmrktVFYFuIuucTt0QKM:rGCPUpnFJ191RdamnD4cTtF4u
Score3/10 -
-
-
Target
FFC11.dll
-
Size
132KB
-
MD5
25a9277afc40e795514d3f1920d40c46
-
SHA1
abf3aeb3206a66a86af3e684c302940eac4984b9
-
SHA256
edb4efd4875e48014f64e727e234d985c0f90093feb42a4911b6f6796f8ae72f
-
SHA512
0c63954fc92da1bfb6aabe9e0494372191299d41508fac367c533d3817ea5012fb63d8473eb3d8f7a5573db67e331dbe4b0783d7ddbd1a239291178eaae16595
-
SSDEEP
3072:00jEXtXappFYoWR7vipWBBt9joJBoY04Oi/nnm:0h5WE7qpWl9nY
Score3/10 -
-
-
Target
Monster Truck Rumble.exe
-
Size
1.4MB
-
MD5
75ddda8d73d7dea6e734de31029c089d
-
SHA1
df0fde6f7f3da76f782aae05824b6bbac6986145
-
SHA256
138a8aca9fd42ffb23331f875e7b4a9a7d92c25f5225306cd7340d45fe607512
-
SHA512
d11713ef4a1094b6f897fe808ecc2530ed248c310fdcc8e4bf63532aa4726e07638fd30a693f8a54a58f4d9777d362b1eab053099bf7f05e5097f3011ae80169
-
SSDEEP
24576:bOqo7MA17jjUhq1C7tX6kq9hpvcfHnTOAC0slw/LKOaK97+K+RtMeKnzouzd5SO:WGHqkqtyHnTO0swjaKDzouzd5SO
-
Detects Strela Stealer payload
-
Blocklisted process makes network request
-
-
-
Target
text/trucks/DarkKnight.tga
-
Size
768KB
-
MD5
c0c864485c8663e240f1c62e2d0bf691
-
SHA1
a084071abf5fd840bd913b6ed356ba54306f372a
-
SHA256
199f5daf29470df7901899685563b818414ac74d298bb0c2a98eadc9932c2c00
-
SHA512
6195b1c91abc7fcd44f690dccda7aed9355542e255a29b712589f205ce0e82723eb8fa7f252021ef5ef2af054ff52d3f924eca19f109a468934af6804ec687d6
-
SSDEEP
12288:oEcyqx8K45UTB7FZQqsCyKA/MmWo0oHmrjvDKT2:ojyq8OlsjSDV
Score3/10 -
-
-
Target
text/trucks/SergeantSteele.tga
-
Size
768KB
-
MD5
66859c43406cbd95456791890973f6b4
-
SHA1
c9a573f36dca9569c94961b38cb7fb583bf56a47
-
SHA256
c124d1e928f3c20b6aaf61a22804ca3d19196d975ad28e4023275d4552c0e62e
-
SHA512
ad7de8876ad1956882390c079926645e7c1ca2bfeb0ff0a2dddb585fa86e1dd8952b32c5b4f9d51b7b04e8bf20b161c4e3346c288b76426650ee56f4af9bc440
-
SSDEEP
6144:TiAd8qr0kyaXMIkBFE6hznyjd+5w0HfuSagSgjcLFbVUM7oapNhjT/UrpFl5W2Cw:Ld7rvfjkXZYLV6M7jpTKpFlI2d
Score3/10 -
-
-
Target
text/trucks/SergeantSteele_dmg.tga
-
Size
768KB
-
MD5
15b058e875eedd951a925e833bce680d
-
SHA1
9e7b819fe1d59baef9a678ec3d5d33737fbbc4ec
-
SHA256
0dafbedd6ea27cea738f0cb4bef65640023bc96c634c1585a6481d911336623b
-
SHA512
fc76c9a43eaf1fa9d0700c1ef39534868c22e9497c2957d430be3e9780962ea716a22f01bc7de99e2d515952c553fef69937b7d5085698ea2a10418eec8b607e
-
SSDEEP
12288:yKR/0hjN3lfg7utR3yrgYhNMAr4mMp+yIRz58:VuN3lfjRgk9+yIRze
Score3/10 -