Overview
overview
4Static
static
3JaffaCakes...c3.exe
windows7-x64
3JaffaCakes...c3.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.exe
windows7-x64
3$PROGRAMFI...it.exe
windows10-2004-x64
3$PROGRAMFI...al.exe
windows7-x64
$PROGRAMFI...al.exe
windows10-2004-x64
AniGIF.dll
windows7-x64
3AniGIF.dll
windows10-2004-x64
3Communicate.dll
windows7-x64
3Communicate.dll
windows10-2004-x64
3FSkill.exe
windows7-x64
3FSkill.exe
windows10-2004-x64
3VnetClinfo.dll
windows7-x64
3VnetClinfo.dll
windows10-2004-x64
3YBNTSrv.exe
windows7-x64
4YBNTSrv.exe
windows10-2004-x64
4YBProces.exe
windows7-x64
3YBProces.exe
windows10-2004-x64
3YBProces.exe
windows7-x64
3YBProces.exe
windows10-2004-x64
3YBStart.exe
windows7-x64
1YBStart.exe
windows10-2004-x64
3YiBopal.exe
windows7-x64
3YiBopal.exe
windows10-2004-x64
3play.exe
windows7-x64
3play.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2bdf48f2c3680bea4b0b150ce6d8cc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2bdf48f2c3680bea4b0b150ce6d8cc3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/QvodPlayer/QvodInit.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PROGRAMFILES/QvodPlayer/QvodInit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/QvodPlayer/QvodTerminal.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/QvodPlayer/QvodTerminal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AniGIF.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AniGIF.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Communicate.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Communicate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FSkill.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
FSkill.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
VnetClinfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
VnetClinfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
YBNTSrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
YBNTSrv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
YBProces.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
YBProces.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
YBProces.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
YBProces.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
YBStart.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
YBStart.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
YiBopal.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
YiBopal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
play.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
play.exe
Resource
win10v2004-20241007-en
General
-
Target
YBProces.exe
-
Size
117KB
-
MD5
4c01abd1b046721c40d824d1e4c64f9c
-
SHA1
55e168ac9c8930c34317a7e02e23e640a6e92544
-
SHA256
43e88cf920be9b9117fc713f8a586701a5f5da50c3c40a2f7bcedd53a71b15d2
-
SHA512
ec93569071231bf2b616ec7ee2356a7271b2366943fa4ad21a4e6d2a24ac754a3f5eea91bb3884dd0c7a94225c67372be6d999a9d5799e0591278ae974bd2683
-
SSDEEP
3072:FPfmnYj/cOjvka2lKKUCIVE1IYFfmqe9J:5mkkYvka2lKZCvbm9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YBProces.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2348 YBProces.exe