Overview
overview
8Static
static
7201b3ddbae...18.exe
windows7-x64
3201b3ddbae...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3CCleaner.exe
windows7-x64
7CCleaner.exe
windows10-2004-x64
1Microsoft.mshtml.dll
windows7-x64
1Microsoft.mshtml.dll
windows10-2004-x64
1cafw.exe
windows7-x64
7cafw.exe
windows10-2004-x64
3cladgenius.chm
windows7-x64
1cladgenius.chm
windows10-2004-x64
1decaptcher.dll
windows7-x64
3decaptcher.dll
windows10-2004-x64
3fbclient.dll
windows7-x64
1fbclient.dll
windows10-2004-x64
1holfix.exe
windows7-x64
8holfix.exe
windows10-2004-x64
8ibprovider.dll
windows7-x64
1ibprovider.dll
windows10-2004-x64
1icudt30.dll
windows7-x64
1icudt30.dll
windows10-2004-x64
1icuin30.dll
windows7-x64
3icuin30.dll
windows10-2004-x64
3icuuc30.dll
windows7-x64
3icuuc30.dll
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 16:58
Behavioral task
behavioral1
Sample
201b3ddbaeaa3cc5f7480d8fe72fc567_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
201b3ddbaeaa3cc5f7480d8fe72fc567_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
CCleaner.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
CCleaner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Microsoft.mshtml.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Microsoft.mshtml.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
cafw.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
cafw.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
cladgenius.chm
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
cladgenius.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
decaptcher.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
decaptcher.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
fbclient.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
fbclient.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
holfix.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
holfix.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
ibprovider.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
ibprovider.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
icudt30.dll
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
icudt30.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
icuin30.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
icuin30.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
icuuc30.dll
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
icuuc30.dll
Resource
win10v2004-20240611-en
General
-
Target
cafw.exe
-
Size
2.7MB
-
MD5
35c7b08f7f45d54e59496855e17e8a0f
-
SHA1
986209258bba1b838b562a464b597ec26046226f
-
SHA256
8c3111371c153c75f6406e802493120337ed64772e7b94ec87cf2d563c9aba25
-
SHA512
d758fc89be81d3c92b38151e9deda72de86393ddde2ce6cb8f96bd437644632d0a60c791964d9117f45ef343a8897b7073b06f8cecab3c639ac7e1404b660d40
-
SSDEEP
49152:tTn7ZlDGoO49xA+McUhLoNYSmgg0QCL75QNH+BvqLz33vZTi/fspHXXNnd0j7d+Z:9ZlDGH4jABcUhYgZCL75QNeBurvZWHYx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
WerFault.exeWerFault.exepid process 2928 WerFault.exe 2088 WerFault.exe -
Loads dropped DLL 2 IoCs
Processes:
cafw.exeWerFault.exepid process 1856 cafw.exe 2928 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe 2088 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
cafw.exeWerFault.exedescription pid process Token: 33 1856 cafw.exe Token: SeIncBasePriorityPrivilege 1856 cafw.exe Token: 33 1856 cafw.exe Token: SeIncBasePriorityPrivilege 1856 cafw.exe Token: SeDebugPrivilege 2088 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cafw.exeWerFault.exedescription pid process target process PID 1856 wrote to memory of 2928 1856 cafw.exe WerFault.exe PID 1856 wrote to memory of 2928 1856 cafw.exe WerFault.exe PID 1856 wrote to memory of 2928 1856 cafw.exe WerFault.exe PID 1856 wrote to memory of 2928 1856 cafw.exe WerFault.exe PID 2928 wrote to memory of 2088 2928 WerFault.exe WerFault.exe PID 2928 wrote to memory of 2088 2928 WerFault.exe WerFault.exe PID 2928 wrote to memory of 2088 2928 WerFault.exe WerFault.exe PID 2928 wrote to memory of 2088 2928 WerFault.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cafw.exe"C:\Users\Admin\AppData\Local\Temp\cafw.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Temp\Xenocode\Sandbox\CLADGenius\1.0.0.0\Native\STUBEXE\8.0.1135\@SYSTEM@\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2282⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Temp\Xenocode\Sandbox\CLADGenius\1.0.0.0\Native\STUBEXE\8.0.1135\@SYSTEM@\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 2843⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\Xenocode\Sandbox\CLADGenius\1.0.0.0\Native\STUBEXE\8.0.1135\@SYSTEM@\WerFault.exeFilesize
17KB
MD5ad2f82f55aad9d937c2755eb5f01c80c
SHA1e730c62b2e04ce6439c97120655e6c890038795b
SHA2566a437bf021c6e0d392051ced6b3a5391a03220c47a9d3f7e003cde12291f259a
SHA51222abd2de4e86451db03eea6d2dbce087d38ba82be73f7852d3010d00ac990cbfb02546774a29407c9c2510dc44c8e39577ed2ac701fa97808a9a27138b3a6a46
-
memory/1856-8-0x0000000000500000-0x0000000000572000-memory.dmpFilesize
456KB
-
memory/1856-6-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/1856-5-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/1856-3-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/1856-7-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/1856-0-0x0000000000500000-0x0000000000572000-memory.dmpFilesize
456KB
-
memory/1856-2-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1856-1-0x00000000775F0000-0x00000000775F1000-memory.dmpFilesize
4KB
-
memory/1856-4-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/1856-52-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1856-51-0x0000000000500000-0x0000000000572000-memory.dmpFilesize
456KB
-
memory/2088-48-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2088-45-0x00000000003F0000-0x0000000000462000-memory.dmpFilesize
456KB
-
memory/2088-43-0x00000000003F0000-0x0000000000462000-memory.dmpFilesize
456KB
-
memory/2928-19-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-14-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-24-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-23-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-25-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-16-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-15-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-17-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-13-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-12-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-18-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-20-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-47-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-22-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-21-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB
-
memory/2928-11-0x0000000001000000-0x000000000105B000-memory.dmpFilesize
364KB