Overview
overview
10Static
static
5JaffaCakes...31.exe
windows7-x64
3JaffaCakes...31.exe
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
7$PLUGINSDI...ar.exe
windows10-2004-x64
3$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...ar.dll
windows7-x64
7$PROGRAM_F...ar.dll
windows10-2004-x64
7$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...er.exe
windows7-x64
3$PROGRAM_F...er.exe
windows10-2004-x64
3$PROGRAM_F...rc.dll
windows7-x64
3$PROGRAM_F...rc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...pt.exe
windows7-x64
7$PLUGINSDI...pt.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...an.exe
windows7-x64
7$PLUGINSDI...an.exe
windows10-2004-x64
7$PLUGINSDI...st.exe
windows7-x64
7$PLUGINSDI...st.exe
windows10-2004-x64
3$PLUGINSDIR/v9fft.exe
windows7-x64
10$PLUGINSDIR/v9fft.exe
windows10-2004-x64
10$TEMP/AskPIP_FF_.exe
windows7-x64
3$TEMP/AskPIP_FF_.exe
windows10-2004-x64
3$TEMP/AskT...IC.dll
windows7-x64
8$TEMP/AskT...IC.dll
windows10-2004-x64
3Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/02/2025, 20:16
Behavioral task
behavioral1
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1501f2ea21bf8b38b5ad8bd8219bec31.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Baidu-TB-ASBar.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAM_FILES/Baidu/ASBarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PROGRAM_FILES/Baidu/AddressBar.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BarBroker.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/rc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/hao123inst-egypt.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/hao123inst-japan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/hao123inst-taiwan.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/hao123inst.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/v9fft.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/v9fft.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
$TEMP/AskPIP_FF_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMP/AskPIP_FF_.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
$TEMP/AskToolbarTemp/ApnIC.dll
Resource
win10v2004-20250217-en
General
-
Target
$PLUGINSDIR/hao123inst-taiwan.exe
-
Size
305KB
-
MD5
efd47a079976283cde2a1f9547689cde
-
SHA1
9f90940372c37d7d4125774190efcd5c8263a2c6
-
SHA256
4c52fc7d54f3b4cb1b4e7bcc66a778e9c704211f8406f382cfbb541db42398a1
-
SHA512
47fac55eb2bd937692048ceebaf5da8d1b72e9d7e6954c51082d2b753039a2c00a82c5db04d7216c412b4376e6da7126662e3f7e6734008333d6840b28301a53
-
SSDEEP
6144:gjbTUh/hQXxBvQ0utY3jNp1NZEE/1rEpYANhWx:gzGQXDo0utIjNHNqGrEKChc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 hao123.1.0.0.1100.exe -
Loads dropped DLL 6 IoCs
pid Process 1840 hao123inst-taiwan.exe 1840 hao123inst-taiwan.exe 1840 hao123inst-taiwan.exe 1840 hao123inst-taiwan.exe 1840 hao123inst-taiwan.exe 1840 hao123inst-taiwan.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral23/memory/1840-0-0x0000000000400000-0x0000000000534000-memory.dmp upx behavioral23/memory/1840-61-0x0000000000400000-0x0000000000534000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123.1.0.0.1100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hao123inst-taiwan.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main hao123inst-taiwan.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://tw.hao123.com/?tn=forf_hp_hao123_tw" hao123inst-taiwan.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1840 hao123inst-taiwan.exe 1840 hao123inst-taiwan.exe 2644 hao123.1.0.0.1100.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2644 1840 hao123inst-taiwan.exe 32 PID 1840 wrote to memory of 2644 1840 hao123inst-taiwan.exe 32 PID 1840 wrote to memory of 2644 1840 hao123inst-taiwan.exe 32 PID 1840 wrote to memory of 2644 1840 hao123inst-taiwan.exe 32 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20 PID 2644 wrote to memory of 1156 2644 hao123.1.0.0.1100.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-taiwan.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hao123inst-taiwan.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\baidu\hao123-tw\hao123.1.0.0.1100.exefirst_exec_from_inst3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD520759fcdc97218cb611caa1abe23cffe
SHA1c87e7d8bdbfeb61e02558b9505f8401854f75eb1
SHA256454d6c8c06a94642c4699370724ea73c1032addbc5d745541f72546b23dfe110
SHA512b974691447716685e3f7a9fd1bfff8710f934a307dd2ddd78ca7b9b4dd4526e4965507af289f9f44ee5b89f4dffeb6410cacd529d0302dc921dbe30eb1320bdd
-
Filesize
992B
MD54431c8d24beadd1b3eea0b9e11c11687
SHA19afa5d195bfd2ebbe8eddd41c1f40ee836219259
SHA2560c71029220017a72cd144c7fec079f59dffa8013ebb56abd1d60cd7ba65465b5
SHA512f4b55ad5dd35be0496516302da10907debe710fc0decb885b0ae627bdb5b37778a89cabcddd5385f9ab9520aa36f63181d3b0fb417f1aa1ac0b229e4194d0bcf
-
Filesize
536KB
MD52d70d95d5aa1027ad772a35d2a95fe2c
SHA1f2c05d81c507d29473bcd84a1b0ddaf12022d1db
SHA2567fa96f4fdff5abb39587b3be3e969c1c0188a75cd9871ef25351c2becd1c1724
SHA512e48e73984644f1a8095fc90fc1fc719fc9b07ccfa0ff1ae9a92f7a73cbe4f99b9c72912f7f1b0c4bd44b9ecc0f3d868d3cccfe6f9a74483feed2f582aacf6991