Overview
overview
7Static
static
3b4eb607c4a...18.exe
windows7-x64
7b4eb607c4a...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3GNU/aspell...l6.dll
windows7-x64
3GNU/aspell...l6.dll
windows10-2004-x64
3GNU/astyle.exe
windows7-x64
1GNU/astyle.exe
windows10-2004-x64
3GNU/ctags.exe
windows7-x64
1GNU/ctags.exe
windows10-2004-x64
3GNU/iconv.dll
windows7-x64
3GNU/iconv.dll
windows10-2004-x64
3GNU/libxml2.dll
windows7-x64
3GNU/libxml2.dll
windows10-2004-x64
3GNU/xmllint.exe
windows7-x64
3GNU/xmllint.exe
windows10-2004-x64
3GNU/zlib1.dll
windows7-x64
3GNU/zlib1.dll
windows10-2004-x64
3UEDOS32.exe
windows7-x64
1UEDOS32.exe
windows10-2004-x64
3Uedit32.exe
windows7-x64
3Uedit32.exe
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
b4eb607c4af9e0d6dd88dfaee8a96fed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4eb607c4af9e0d6dd88dfaee8a96fed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
GNU/aspell/bin/aspell6.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
GNU/aspell/bin/aspell6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
GNU/astyle.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
GNU/astyle.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
GNU/ctags.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
GNU/ctags.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
GNU/iconv.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
GNU/iconv.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
GNU/libxml2.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
GNU/libxml2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
GNU/xmllint.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
GNU/xmllint.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
GNU/zlib1.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
GNU/zlib1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
UEDOS32.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
UEDOS32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Uedit32.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Uedit32.exe
Resource
win10v2004-20241007-en
General
-
Target
Uedit32.exe
-
Size
9.9MB
-
MD5
fa359bdcc9d06c3efaf3fc2143641a67
-
SHA1
bee9a5f1ba8292d26e0f7f7a00530f859c928da5
-
SHA256
75f6958db91edc7745235374848c91ec4f7fbc6d0c9cffb2c3ae223da4e18fc7
-
SHA512
214b5379865013dc3c7891630a51b6074cd4fb9e66abdd7b5bf0e7c0e668ea1fdadb87a32dafc4a6109a8621c9386fe99a2f1f4bf329bfec709a9e10c9b10ff6
-
SSDEEP
98304:oEmzkOY7yIBl5Ktq8weyJPNgmR+Q/+icSFu1nH9/WL1YbP0Hk+CGRzOsCND9g4mj:Q4x7975dNgO//A9/WL2KCedj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uedit32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\IESettingSync Uedit32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Uedit32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\ = "UltraEdit Encryption File" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell\Open Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Uedit32.exe\" \"%1\"" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell\Print Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.uenc\ = "UltraEdit.uenc" Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell\Print\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Uedit32.exe\" /p \"%1\"" Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.uenc\PerceivedType = "text" Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.uenc\OpenWithProgids\UltraEdit.uenc Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell\Open\Command Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\UltraEdit.uenc\shell\Print\Command Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.uenc Uedit32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.uenc\Content Type = "text/plain" Uedit32.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.uenc\OpenWithProgids Uedit32.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe 1244 Uedit32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51dc827e82585fc80e5aa7ca52169b56b
SHA1b046d5890c4f26991f4f69619992aca1b552f3da
SHA256a750bef57d691b911c285ed1ee14457cb0fc0ff9b1f943740636577df8778f1d
SHA512cdebdce0458431946dfe251157ea51dda038f8b6d03c133d3b841caa6e720f8d5569214baa3c14089e84ce224d3f676b7663bae45e12ad6452b6a906d86d9991
-
Filesize
7KB
MD502fcc3d3721bcae650c336544d8063d6
SHA19ba8367197f911c2a072c52abd51720c3f3bcd2e
SHA256783c62838e59482490f24e7dd4c33d5999ce9298f0ab0d4c4178a0c0476d182d
SHA51231f7441a054b1a1514d2452f6df17a279cfa0a2543cf1bfb0730c08fd08be1b07aaac74f01a089d8aa2e5f7a45e78f4040f2e0312c0d0f155d5477b5d3c0daca
-
Filesize
48KB
MD5217107398a96067d4175682052fd353e
SHA17a39c88fff3c7b736cfd663f4e4bfd63b072b143
SHA2565a4fd55068da3c4e8931128f4d5b34be594fde4f2004c227abd619f92fd32a4f
SHA512b714a42b2c0b6a31f1e33bd7f9c7b3ea8509a1571fa25708163ffc18cbf60d6a40b8e7e71c838854bee65c54e4a57454f28e8c442d5dad444c657a5829860d7a
-
Filesize
69B
MD5b21754eea00796171df9069cbe4bfff5
SHA125b9150462f5e9ac70323737f5c6bc26ec4f6415
SHA25616fff4f651843e174e73d3cea4cbee4fdbce7cdfa272496da0d09cb1b202f8a1
SHA512444300f9da69cad4ee43d0ba647dd9d060fbcd9c832e451fb89d65f53a3a10a8525a52cda425dbef95a1734bd2e494f5eab07bc8fa7c2f26721e3bb85d089820
-
Filesize
23KB
MD5d78ced07da18c9cd5b53b70e1a1d0ed5
SHA15e1a1651330d1945bc7917e152af8c482830b96a
SHA256198ae610aa39d1414fb9999bb69d011859b33ae14019cae039428ea0f67987e2
SHA512bef7253c655822898a291feafff5db1bee37a506c11759ef39d709392e76baf6d0a986bb342f2b5ed502784d1f0b51ae959eca1d47bd5ca7258c4faecccf907d