Overview
overview
7Static
static
3f1b8c15947...18.exe
windows7-x64
3f1b8c15947...18.exe
windows10-2004-x64
3$SYSDIR/Ak...er.scr
windows7-x64
1$SYSDIR/Ak...er.scr
windows10-2004-x64
1$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
1tbu03852/options.html
windows10-2004-x64
1tbu03852/s...g.html
windows7-x64
1tbu03852/s...g.html
windows10-2004-x64
1tbu03852/s...b.html
windows7-x64
1tbu03852/s...b.html
windows10-2004-x64
1tbu03852/tbhelper.dll
windows7-x64
1tbu03852/tbhelper.dll
windows10-2004-x64
1tbu03852/t...091.js
windows7-x64
1tbu03852/t...091.js
windows10-2004-x64
1tbu03852/u...ll.exe
windows7-x64
1tbu03852/u...ll.exe
windows10-2004-x64
1tbu03852/update.exe
windows7-x64
1tbu03852/update.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
f1b8c159476cef41d3e6b5e536a66a8f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1b8c159476cef41d3e6b5e536a66a8f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$SYSDIR/Akon_Screensaver.scr
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$SYSDIR/Akon_Screensaver.scr
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$TEMP/dospop.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
tbu03852/dospop.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
tbu03852/options.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
tbu03852/options.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
tbu03852/static_img.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
tbu03852/static_img.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
tbu03852/static_pub.html
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
tbu03852/static_pub.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
tbu03852/tbhelper.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
tbu03852/uninstall.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
tbu03852/update.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
tbu03852/update.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20240412-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
47d3a1dee4f8a3ea72850c24d853a59d
-
SHA1
36ef3fdae7709fae34715e76c10bbcb60d021a38
-
SHA256
94f69d567ecf9e117eb744a965bff820cee36202156049c8f5da6d5c87463dd9
-
SHA512
c3429ab3a4f515dd5672832133b63b6f3e278ce846c5d929519d8856b124d99955d175a51afac486ac0010b01bc420e80f347deabd3a25b35e1fb336434a7bb7
-
SSDEEP
1536:DRf1o2Ca7qiagSshdS0D6mJjgdLeAyNLhte:Dpj7EUbD6mJjceAQg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral24/files/0x0007000000023270-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 908 wrote to memory of 2272 908 Uninstall.exe 84 PID 908 wrote to memory of 2272 908 Uninstall.exe 84 PID 908 wrote to memory of 2272 908 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD547d3a1dee4f8a3ea72850c24d853a59d
SHA136ef3fdae7709fae34715e76c10bbcb60d021a38
SHA25694f69d567ecf9e117eb744a965bff820cee36202156049c8f5da6d5c87463dd9
SHA512c3429ab3a4f515dd5672832133b63b6f3e278ce846c5d929519d8856b124d99955d175a51afac486ac0010b01bc420e80f347deabd3a25b35e1fb336434a7bb7