Overview
overview
10Static
static
3JaffaCakes...c7.exe
windows7-x64
3JaffaCakes...c7.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...dk.dll
windows7-x64
3$PLUGINSDI...dk.dll
windows10-2004-x64
3AdsScheduler.exe
windows7-x64
AdsScheduler.exe
windows10-2004-x64
Base.exe
windows7-x64
1Base.exe
windows10-2004-x64
3PlaylistGe...ro.exe
windows7-x64
10PlaylistGe...ro.exe
windows10-2004-x64
10ReportViewer.exe
windows7-x64
1ReportViewer.exe
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_21a2e687d56920ca9d644f7d40a979c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_21a2e687d56920ca9d644f7d40a979c7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsisdk.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsisdk.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
AdsScheduler.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
AdsScheduler.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Base.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Base.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
PlaylistGeneratorPro.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
PlaylistGeneratorPro.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
ReportViewer.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ReportViewer.exe
Resource
win10v2004-20250217-en
General
-
Target
PlaylistGeneratorPro.exe
-
Size
3.2MB
-
MD5
f9fd3035e88efea757ca653b360ec2fe
-
SHA1
da1647e0287281ec190fab7805b4f72efef782c6
-
SHA256
f95705a5f3e2c572db21e58f4b516a6030d95c4b358c20a36b1c15a215e12c80
-
SHA512
70d4b5c2344ef0143a36cde824d44c1b0ea1f111c1877812765d0a2baa9f7178d0a307256a02de6f877b5c78c203bddbd5a805e6eb14d6c99d18943fc131a22a
-
SSDEEP
49152:5Gvr1ImETNsn4+0AWSQFxFvV8gd5duBPfl3dkzT6UFTVANx:5GvudPS2xFP5yPfCFqj
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PlaylistGeneratorPro.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate PlaylistGeneratorPro.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlaylistGeneratorPro.exe -
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\DefaultIcon\ = "%SystemRoot%\\SysWow64\\imageres.dll,-117" PlaylistGeneratorPro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\InProcServer32\ = "%SystemRoot%\\SysWow64\\windows.storage.dll" PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\shellex\ContextMenuHandlers PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\shellex\ContextMenuHandlers\{A8E64375-B645-4314-9EFC-C085981786FA} PlaylistGeneratorPro.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\ShellFolder\RestrictedAttributes = "50" PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A} PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\DefaultIcon PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\InProcServer32 PlaylistGeneratorPro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\InProcServer32\ThreadingModel = "Apartment" PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\shellex PlaylistGeneratorPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\ShellFolder PlaylistGeneratorPro.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\ShellFolder\Attributes = "537133056" PlaylistGeneratorPro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{887BF051-ACD5-3280-2F73-B27140EDA99A}\NoPreviousVersions PlaylistGeneratorPro.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5036 PlaylistGeneratorPro.exe Token: SeIncBasePriorityPrivilege 5036 PlaylistGeneratorPro.exe