Overview
overview
7Static
static
3b4eb607c4a...18.exe
windows7-x64
7b4eb607c4a...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3GNU/aspell...l6.dll
windows7-x64
3GNU/aspell...l6.dll
windows10-2004-x64
3GNU/astyle.exe
windows7-x64
1GNU/astyle.exe
windows10-2004-x64
3GNU/ctags.exe
windows7-x64
1GNU/ctags.exe
windows10-2004-x64
3GNU/iconv.dll
windows7-x64
3GNU/iconv.dll
windows10-2004-x64
3GNU/libxml2.dll
windows7-x64
3GNU/libxml2.dll
windows10-2004-x64
3GNU/xmllint.exe
windows7-x64
3GNU/xmllint.exe
windows10-2004-x64
3GNU/zlib1.dll
windows7-x64
3GNU/zlib1.dll
windows10-2004-x64
3UEDOS32.exe
windows7-x64
1UEDOS32.exe
windows10-2004-x64
3Uedit32.exe
windows7-x64
3Uedit32.exe
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
b4eb607c4af9e0d6dd88dfaee8a96fed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4eb607c4af9e0d6dd88dfaee8a96fed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
GNU/aspell/bin/aspell6.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
GNU/aspell/bin/aspell6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
GNU/astyle.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
GNU/astyle.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
GNU/ctags.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
GNU/ctags.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
GNU/iconv.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
GNU/iconv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
GNU/libxml2.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
GNU/libxml2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
GNU/xmllint.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
GNU/xmllint.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
GNU/zlib1.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
GNU/zlib1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
UEDOS32.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
UEDOS32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Uedit32.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Uedit32.exe
Resource
win10v2004-20241007-en
General
-
Target
Uedit32.exe
-
Size
9.9MB
-
MD5
fa359bdcc9d06c3efaf3fc2143641a67
-
SHA1
bee9a5f1ba8292d26e0f7f7a00530f859c928da5
-
SHA256
75f6958db91edc7745235374848c91ec4f7fbc6d0c9cffb2c3ae223da4e18fc7
-
SHA512
214b5379865013dc3c7891630a51b6074cd4fb9e66abdd7b5bf0e7c0e668ea1fdadb87a32dafc4a6109a8621c9386fe99a2f1f4bf329bfec709a9e10c9b10ff6
-
SSDEEP
98304:oEmzkOY7yIBl5Ktq8weyJPNgmR+Q/+icSFu1nH9/WL1YbP0Hk+CGRzOsCND9g4mj:Q4x7975dNgO//A9/WL2KCedj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uedit32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Uedit32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.uenc\Content Type = "text/plain" Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.uenc\OpenWithProgids\UltraEdit.uenc Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\ = "UltraEdit Encryption File" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.uenc Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.uenc\OpenWithProgids Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell\Open\Command Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Uedit32.exe\" \"%1\"" Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.uenc\ = "UltraEdit.uenc" Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.uenc\PerceivedType = "text" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell\Print\Command Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell\Print Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell\Open Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\UltraEdit.uenc\shell\Print\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Uedit32.exe\" /p \"%1\"" Uedit32.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe 2936 Uedit32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51dc827e82585fc80e5aa7ca52169b56b
SHA1b046d5890c4f26991f4f69619992aca1b552f3da
SHA256a750bef57d691b911c285ed1ee14457cb0fc0ff9b1f943740636577df8778f1d
SHA512cdebdce0458431946dfe251157ea51dda038f8b6d03c133d3b841caa6e720f8d5569214baa3c14089e84ce224d3f676b7663bae45e12ad6452b6a906d86d9991
-
Filesize
7KB
MD502fcc3d3721bcae650c336544d8063d6
SHA19ba8367197f911c2a072c52abd51720c3f3bcd2e
SHA256783c62838e59482490f24e7dd4c33d5999ce9298f0ab0d4c4178a0c0476d182d
SHA51231f7441a054b1a1514d2452f6df17a279cfa0a2543cf1bfb0730c08fd08be1b07aaac74f01a089d8aa2e5f7a45e78f4040f2e0312c0d0f155d5477b5d3c0daca
-
Filesize
48KB
MD5217107398a96067d4175682052fd353e
SHA17a39c88fff3c7b736cfd663f4e4bfd63b072b143
SHA2565a4fd55068da3c4e8931128f4d5b34be594fde4f2004c227abd619f92fd32a4f
SHA512b714a42b2c0b6a31f1e33bd7f9c7b3ea8509a1571fa25708163ffc18cbf60d6a40b8e7e71c838854bee65c54e4a57454f28e8c442d5dad444c657a5829860d7a
-
Filesize
69B
MD5b21754eea00796171df9069cbe4bfff5
SHA125b9150462f5e9ac70323737f5c6bc26ec4f6415
SHA25616fff4f651843e174e73d3cea4cbee4fdbce7cdfa272496da0d09cb1b202f8a1
SHA512444300f9da69cad4ee43d0ba647dd9d060fbcd9c832e451fb89d65f53a3a10a8525a52cda425dbef95a1734bd2e494f5eab07bc8fa7c2f26721e3bb85d089820
-
Filesize
23KB
MD5d78ced07da18c9cd5b53b70e1a1d0ed5
SHA15e1a1651330d1945bc7917e152af8c482830b96a
SHA256198ae610aa39d1414fb9999bb69d011859b33ae14019cae039428ea0f67987e2
SHA512bef7253c655822898a291feafff5db1bee37a506c11759ef39d709392e76baf6d0a986bb342f2b5ed502784d1f0b51ae959eca1d47bd5ca7258c4faecccf907d