Overview
overview
4Static
static
3JaffaCakes...c3.exe
windows7-x64
3JaffaCakes...c3.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.exe
windows7-x64
3$PROGRAMFI...it.exe
windows10-2004-x64
3$PROGRAMFI...al.exe
windows7-x64
$PROGRAMFI...al.exe
windows10-2004-x64
AniGIF.dll
windows7-x64
3AniGIF.dll
windows10-2004-x64
3Communicate.dll
windows7-x64
3Communicate.dll
windows10-2004-x64
3FSkill.exe
windows7-x64
3FSkill.exe
windows10-2004-x64
3VnetClinfo.dll
windows7-x64
3VnetClinfo.dll
windows10-2004-x64
3YBNTSrv.exe
windows7-x64
4YBNTSrv.exe
windows10-2004-x64
4YBProces.exe
windows7-x64
3YBProces.exe
windows10-2004-x64
3YBProces.exe
windows7-x64
3YBProces.exe
windows10-2004-x64
3YBStart.exe
windows7-x64
1YBStart.exe
windows10-2004-x64
3YiBopal.exe
windows7-x64
3YiBopal.exe
windows10-2004-x64
3play.exe
windows7-x64
3play.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2bdf48f2c3680bea4b0b150ce6d8cc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2bdf48f2c3680bea4b0b150ce6d8cc3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/QvodPlayer/QvodInit.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PROGRAMFILES/QvodPlayer/QvodInit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/QvodPlayer/QvodTerminal.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/QvodPlayer/QvodTerminal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AniGIF.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AniGIF.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Communicate.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Communicate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
FSkill.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
FSkill.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
VnetClinfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
VnetClinfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
YBNTSrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
YBNTSrv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
YBProces.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
YBProces.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
YBProces.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
YBProces.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
YBStart.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
YBStart.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
YiBopal.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
YiBopal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
play.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
play.exe
Resource
win10v2004-20241007-en
General
-
Target
play.exe
-
Size
573KB
-
MD5
397708652078f31aefeeda0b0fed18bf
-
SHA1
9e68789d7c0f16c0723101d9c643460567adbbcc
-
SHA256
0abc2db0f75fcbdcdb7004cc08ad9e999326a18fb2bd5d33f724e738933b00b3
-
SHA512
d7ad90fd4ad04bdf183015b4f1be4040cb905cbcfdc2ec2eb47f914b5dedcc17871078c07fbe48b2b4ef48d24c06abc499d9a516e3b04769bf45725537922ec3
-
SSDEEP
12288:v4asSmNRGkugfTHMPWoomXCjraVFquq3X18YZAGm9:1WNRGkugbHMPWooYIrh8YZAl9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language play.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protections.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YiBopal.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF}\InprocServer32 play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403} play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403}\1.0 play.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403}\1.0\0\win32\ = "\\QvodInsert.dll" play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F44453E-1E46-4D5C-B57C-112FF2EDAE82} play.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403}\1.0\HELPDIR\ play.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF}\ToolboxBitmap32\ = "\\QvodInsert.dll, 101" play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403}\1.0\0\win32 play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403}\1.0\HELPDIR play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A6FB6E89-628F-4597-A52B-0AADBE5713CA}\1.0\0\win32 play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF} play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF}\ToolboxBitmap32 play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F44453E-1E46-4D5C-B57C-112FF2EDAE82}\InprocServer32 play.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F44453E-1E46-4D5C-B57C-112FF2EDAE82}\InprocServer32\ = "\\QvodBand.dll" play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A6FB6E89-628F-4597-A52B-0AADBE5713CA}\1.0 play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A6FB6E89-628F-4597-A52B-0AADBE5713CA}\1.0\0 play.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3D0D36F-23F8-4682-A195-74C92B03D4AF}\InprocServer32\ = "\\QvodInsert.dll" play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2566F758-FE4A-4691-9F93-30AF685BB403}\1.0\0 play.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A6FB6E89-628F-4597-A52B-0AADBE5713CA} play.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A6FB6E89-628F-4597-A52B-0AADBE5713CA}\1.0\0\win32\ = "\\QvodInsert.oca" play.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3608 play.exe 3608 play.exe 3608 play.exe 3608 play.exe 3608 play.exe 3608 play.exe 3608 play.exe 3608 play.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 3608 play.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3592 YiBopal.exe 3592 YiBopal.exe 3592 YiBopal.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe 3952 protections.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3592 YiBopal.exe 3592 YiBopal.exe 3592 YiBopal.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3608 play.exe 3952 protections.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3952 3608 play.exe 82 PID 3608 wrote to memory of 3952 3608 play.exe 82 PID 3608 wrote to memory of 3952 3608 play.exe 82 PID 3608 wrote to memory of 4504 3608 play.exe 83 PID 3608 wrote to memory of 4504 3608 play.exe 83 PID 3608 wrote to memory of 4504 3608 play.exe 83 PID 3608 wrote to memory of 4984 3608 play.exe 84 PID 3608 wrote to memory of 4984 3608 play.exe 84 PID 3608 wrote to memory of 4984 3608 play.exe 84 PID 3608 wrote to memory of 3148 3608 play.exe 85 PID 3608 wrote to memory of 3148 3608 play.exe 85 PID 3608 wrote to memory of 3148 3608 play.exe 85 PID 3608 wrote to memory of 3592 3608 play.exe 86 PID 3608 wrote to memory of 3592 3608 play.exe 86 PID 3608 wrote to memory of 3592 3608 play.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\play.exe"C:\Users\Admin\AppData\Local\Temp\play.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\protections.exeC:\Users\Admin\AppData\Local\Temp\protections.exe /loadingTrue2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3952
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 /s \QvodInsert.dll2⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 /s \QvodBand.dll2⤵
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 /s \NetAgent.dll2⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\YiBopal.exeC:\Users\Admin\AppData\Local\Temp\YiBopal.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3592
-