Overview
overview
7Static
static
3043b25942f...18.exe
windows7-x64
7043b25942f...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
37za.exe
windows7-x64
17za.exe
windows10-2004-x64
1Uninstaller.exe
windows7-x64
7Uninstaller.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
66s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
043b25942fb2b7cb9ddf6684816d7579_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
043b25942fb2b7cb9ddf6684816d7579_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
7za.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
7za.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Uninstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Uninstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
General
-
Target
Uninstaller.exe
-
Size
307KB
-
MD5
69eb0fada0246cd3c14f4ed7e013f1ae
-
SHA1
ee931af7b20bdbca933aa940bcbe41c5660c4ff6
-
SHA256
082e2d84c44fd03c5ca3a0644e7078879a3442c27464034e54bbd372e78596fb
-
SHA512
837fe569c745cf36b99d684e520233f1e713c08aa8947d0be53fe9a9a92acc5969b92e92f89ca3efee6f53d6c2cdbe9989b658b7dd43521a2439310b0ba45563
-
SSDEEP
6144:jQ3U77Vo6xnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2yB:977DnM3D0Fw/tN8dkmLtpHHHrh7TB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2004 Au_.exe 2004 Au_.exe 2004 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x000a000000023ba1-3.dat nsis_installer_1 behavioral12/files/0x000a000000023ba1-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 8 wrote to memory of 2004 8 Uninstaller.exe 83 PID 8 wrote to memory of 2004 8 Uninstaller.exe 83 PID 8 wrote to memory of 2004 8 Uninstaller.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
9KB
MD5ef2ba370973a3f8aba1533cb3858921b
SHA1c2211408f29a46fc26198cddf411694c0e7e0eb8
SHA256ed575c8bddf21cc6d689646ecfdeafe356e0f9945a282eda79f3b636b77a4453
SHA51207aac20904fb164ba91b7c619b674d5e0f4d1ec8ba03fbd7e123ef53ff4b134278e01964fb81dfcc2905b760c572a7e13c87114bdb279f1d26632ebe71c628ba
-
Filesize
307KB
MD569eb0fada0246cd3c14f4ed7e013f1ae
SHA1ee931af7b20bdbca933aa940bcbe41c5660c4ff6
SHA256082e2d84c44fd03c5ca3a0644e7078879a3442c27464034e54bbd372e78596fb
SHA512837fe569c745cf36b99d684e520233f1e713c08aa8947d0be53fe9a9a92acc5969b92e92f89ca3efee6f53d6c2cdbe9989b658b7dd43521a2439310b0ba45563