Overview
overview
7Static
static
3JaffaCakes...a6.exe
windows7-x64
7JaffaCakes...a6.exe
windows10-2004-x64
7$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.dll
windows7-x64
3$PLUGINSDI...pt.dll
windows10-2004-x64
3$SYSDIR/ad...ve.exe
windows7-x64
7$SYSDIR/ad...ve.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_5_.dll
windows7-x64
6$_5_.dll
windows10-2004-x64
6Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 02:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_277ca3aa4a3aeddb75c7c02f7c6dfca6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_277ca3aa4a3aeddb75c7c02f7c6dfca6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsBrowserOpt.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsBrowserOpt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$SYSDIR/adzgalore-remove.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$SYSDIR/adzgalore-remove.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_5_.dll
Resource
win7-20240903-en
General
-
Target
$SYSDIR/adzgalore-remove.exe
-
Size
99KB
-
MD5
31709de9a5d9f2906dce36c836e4e055
-
SHA1
cc59ca78fa077fff9384570189ac16b091bf49ec
-
SHA256
21f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5
-
SHA512
bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74
-
SSDEEP
1536:WUeHiWRgkkjH8nyWmJPnWb/Nv07LVpN6MzPY0rBAWCKSjqBkHBTXHccDuVbH8k5O:Wd/vyWmJqG7/wu6WCqGdccDc775kMZI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 1856 adzgalore-remove.exe 2836 Au_.exe 2836 Au_.exe 2836 Au_.exe 2836 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adzgalore-remove.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x00060000000160da-2.dat nsis_installer_1 behavioral11/files/0x00060000000160da-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30 PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30 PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30 PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30 PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30 PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30 PID 1856 wrote to memory of 2836 1856 adzgalore-remove.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe"C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$SYSDIR\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5cd6e705cc6992e869f488ab211ac37cb
SHA1c9c71edd929c15bcf5ee286d4a9e9259d1590eb5
SHA25644e729371099650904bcd5db0af7fdad6ffc01e336ae464f0bb151f329175292
SHA512460173bbcff640721e54bb403e1f46d274e649a9db7d3b83d009a7f00354d434874dfdc009679e98cfb05548801b9eee78c25fe17b083fac396087ad3327debf
-
Filesize
545B
MD525c120d9bfb2bf6cdc7d6548201ab4f3
SHA1ffef7d23c1252e571b5a8f681667a873592e545b
SHA2568c01b7a65d2c86fc326bca8aa49de9a84882be2920264a82dde94794a70d9f91
SHA512040b0b1e8bffb56fcfe9fef11b80f51761e7c76b3e26a17ebbcec6ea9b2afaeb4c2024a7f73a268431c2835ae6ad81ef2f1117d65f1874b04fac43987ba2b5d6
-
Filesize
509B
MD5041dc0ad4bcb725323cba55337b86682
SHA16447b3327e92304e1e9bc78fb09150188fd4f578
SHA256d4bbec17ff3ed87119d69c327f3488a70538d12c582a152f89f3754896bb6922
SHA5126d960ef34a2272c42a80d3c8548d93f1dafe354dc740a4d5aae08783c7d15a620429b55782b07a40821ffa15c374ba4aa89e1bdf7f8229834c1b3161feab9d3e
-
Filesize
99KB
MD531709de9a5d9f2906dce36c836e4e055
SHA1cc59ca78fa077fff9384570189ac16b091bf49ec
SHA25621f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5
SHA512bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74