Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe
-
Size
290KB
-
MD5
e64c67b5d78a53909bfadfbf781162e9
-
SHA1
aa5582e0420bd0e5905537233b94f145e039a2c6
-
SHA256
2443cfea2a2de60fe321282643231993f8c3960066509d004da95c901566757a
-
SHA512
8ede7ecbaa13b99276ee46fa2beeb1fa06ee2f3a5a86b3a4b8ff16f99d4e2904f035914a4b091fbe87beab72645c35cd0ae76a65757045e87f27122e2e633a77
-
SSDEEP
6144:+z+92mhAMJ/cPl3ix0LHoVzkLhQusXS3CCtr3S7ogs2X69A83v:+K2mhAMJ/cPlFQkCuPvr3woX2X6+8f
Malware Config
Signatures
-
Detects PlugX payload 14 IoCs
resource yara_rule behavioral1/memory/3060-23-0x00000000003A0000-0x00000000003DF000-memory.dmp family_plugx behavioral1/memory/2488-42-0x00000000003A0000-0x00000000003DF000-memory.dmp family_plugx behavioral1/memory/2488-43-0x00000000003A0000-0x00000000003DF000-memory.dmp family_plugx behavioral1/memory/1644-49-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/3060-51-0x00000000003A0000-0x00000000003DF000-memory.dmp family_plugx behavioral1/memory/1644-52-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/1644-65-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/1644-64-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/1644-63-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/1644-67-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/1644-68-0x0000000000290000-0x00000000002CF000-memory.dmp family_plugx behavioral1/memory/1796-76-0x00000000008E0000-0x000000000091F000-memory.dmp family_plugx behavioral1/memory/1796-79-0x00000000008E0000-0x000000000091F000-memory.dmp family_plugx behavioral1/memory/1796-78-0x00000000008E0000-0x000000000091F000-memory.dmp family_plugx -
Plugx family
-
Deletes itself 1 IoCs
pid Process 1644 svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 3060 TPLCDCLR.EXE 2488 TPLCDCLR.EXE -
Loads dropped DLL 6 IoCs
pid Process 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 3060 TPLCDCLR.EXE 2488 TPLCDCLR.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPLCDCLR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPLCDCLR.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 37003800380043004600410038003200450044003900330039004300370030000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1644 svchost.exe 1644 svchost.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1644 svchost.exe 1644 svchost.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1644 svchost.exe 1644 svchost.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1644 svchost.exe 1644 svchost.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe 1796 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1644 svchost.exe 1796 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3060 TPLCDCLR.EXE Token: SeTcbPrivilege 3060 TPLCDCLR.EXE Token: SeDebugPrivilege 2488 TPLCDCLR.EXE Token: SeTcbPrivilege 2488 TPLCDCLR.EXE Token: SeDebugPrivilege 1644 svchost.exe Token: SeTcbPrivilege 1644 svchost.exe Token: SeDebugPrivilege 1796 msiexec.exe Token: SeTcbPrivilege 1796 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 1968 wrote to memory of 3060 1968 e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 2488 wrote to memory of 1644 2488 TPLCDCLR.EXE 30 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33 PID 1644 wrote to memory of 1796 1644 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e64c67b5d78a53909bfadfbf781162e9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\TPLCDCLR.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\TPLCDCLR.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\ProgramData\Intel(R) Capability Licensing Service Interface CPUMonitor\TPLCDCLR.EXE"C:\ProgramData\Intel(R) Capability Licensing Service Interface CPUMonitor\TPLCDCLR.EXE"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 16443⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD55ce1c050fb6370e5cf997313abba9947
SHA16751978299e9b956da914a5110438b6b262dcb75
SHA256ab927653e27e3374aa97eb9bfdacb011a7664d930e6f356512c5ae9582c2cfe5
SHA512e6ce9bf2392fb9610efdfa0abb460b8031cef020ffed2b4cae9b609631f0fba5ae18ea311dc8f94aa5f46a4dbac9064186b5a0648459504256a7fb17ad8c3061
-
Filesize
78KB
MD5be59ff05b96b7bb251dd77932b71bbc1
SHA128a4a3be8606aea4f46761238d99fa4d7a96354e
SHA256c8dd154950db3401b2e91c6a535b2f0f8853bc188e31f9d91c96bf31cebd1251
SHA5122e06ad4dac78bd08d8c0b9925455662900bc6cf71df70ce478d18bc4cb273ab6fd15eedaa563c646001765a1a8878b752748abc1ea6c43a1acdf32a76c524050
-
Filesize
37KB
MD5d9978f95ce30e85943efb52c9c7d731b
SHA1a64bb28c87c4e41be56a9bb3b887c53051eb1db5
SHA25669c2c1733dd95f16a1e89869ec05a618c27df1e7e86a51884abcdeb709eb3d45
SHA512766a222e9f6fc9acafd2bbf72fdf44bb486d394cbd8751d487d47e828760240b1b945775efd17e77ca6b163e9e1f140f4612715b63b390cdf86e20325112124c