Overview
overview
7Static
static
3JaffaCakes...a6.exe
windows7-x64
7JaffaCakes...a6.exe
windows10-2004-x64
7$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.dll
windows7-x64
3$PLUGINSDI...pt.dll
windows10-2004-x64
3$SYSDIR/ad...ve.exe
windows7-x64
7$SYSDIR/ad...ve.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_5_.dll
windows7-x64
6$_5_.dll
windows10-2004-x64
6Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 02:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_277ca3aa4a3aeddb75c7c02f7c6dfca6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_277ca3aa4a3aeddb75c7c02f7c6dfca6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsBrowserOpt.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsBrowserOpt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$SYSDIR/adzgalore-remove.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$SYSDIR/adzgalore-remove.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_5_.dll
Resource
win7-20240903-en
General
-
Target
$SYSDIR/adzgalore-remove.exe
-
Size
99KB
-
MD5
31709de9a5d9f2906dce36c836e4e055
-
SHA1
cc59ca78fa077fff9384570189ac16b091bf49ec
-
SHA256
21f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5
-
SHA512
bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74
-
SSDEEP
1536:WUeHiWRgkkjH8nyWmJPnWb/Nv07LVpN6MzPY0rBAWCKSjqBkHBTXHccDuVbH8k5O:Wd/vyWmJqG7/wu6WCqGdccDc775kMZI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adzgalore-remove.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x0007000000023cbe-4.dat nsis_installer_1 behavioral12/files/0x0007000000023cbe-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2216 1056 adzgalore-remove.exe 83 PID 1056 wrote to memory of 2216 1056 adzgalore-remove.exe 83 PID 1056 wrote to memory of 2216 1056 adzgalore-remove.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe"C:\Users\Admin\AppData\Local\Temp\$SYSDIR\adzgalore-remove.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$SYSDIR\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5cd6e705cc6992e869f488ab211ac37cb
SHA1c9c71edd929c15bcf5ee286d4a9e9259d1590eb5
SHA25644e729371099650904bcd5db0af7fdad6ffc01e336ae464f0bb151f329175292
SHA512460173bbcff640721e54bb403e1f46d274e649a9db7d3b83d009a7f00354d434874dfdc009679e98cfb05548801b9eee78c25fe17b083fac396087ad3327debf
-
Filesize
457B
MD54d023e0570bd838b5c925d9252305c91
SHA1f89742f5e052c699dd87726c6f3e3ca9885bfe38
SHA2567f8f1ddca6f57c6b1c76709a5f7e1cd0024b1182fb76de432b797d85ebac0a2a
SHA512af9645a288282e5f955226b3b93f98ff4fc0df11b6ceaffec8fe1d56873b69eca2d52a17172fa973a31e76587513f02140eb9d5a16949e00a7590453a6cf6e13
-
Filesize
545B
MD5a226cc607bcb0e586e95d66d714eacf0
SHA15e0c1d4dad61a07c26dde8cc2992477bb72bf14f
SHA256bb1d78376377c81d468ec8c78b1210776c7bc32abb6c5e37c371444f3923be63
SHA5122a7ea2f9c9593ab502a1e1ae7c144fe209be9d679650f11deba2909a5ed27ec875eb4addc3ac5615ca4d88e8ec33796ff2f827b134e62b258025dc0db28be959
-
Filesize
99KB
MD531709de9a5d9f2906dce36c836e4e055
SHA1cc59ca78fa077fff9384570189ac16b091bf49ec
SHA25621f7cb13c3a8d35e8533ffa55485a4c1c7c35e41d93893cbc0dda43b3b00e7e5
SHA512bfd57f3bf8ec9c7ed04e51e67b2e0f0428cb811f0d1bf2015b78a0d5e93c65aa4da1648fe49bfecd88b7f613ef6ba4b9106fc19053c39d96011d0f18ce2ddf74