Overview
overview
10Static
static
30e37aa08c3...18.exe
windows7-x64
70e37aa08c3...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3GLWorker.exe
windows7-x64
10GLWorker.exe
windows10-2004-x64
10MagicMatch.exe
windows7-x64
10MagicMatch.exe
windows10-2004-x64
10Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
0e37aa08c3aa86989636f438c2f2bada_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e37aa08c3aa86989636f438c2f2bada_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
GLWorker.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
GLWorker.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
MagicMatch.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
MagicMatch.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
General
-
Target
Uninstall.exe
-
Size
99KB
-
MD5
938a3a38a1f3305e267f050f4567e259
-
SHA1
5f39937c32ace402530c93a8ec445ebcfe2bfdd1
-
SHA256
081b40881c097faa045087133cd2353386c1066f95a3f2ec2ef10a9909f3f12c
-
SHA512
ffe97f9960fb28d68dd9659589f01894064207b2e38d23401181bc021dc6cbfa6f920010c65938e0d020068ff414fddeb7ebc190471153f420752e8581b3c86b
-
SSDEEP
3072:X5TDpNFVbxDSXJF3BaVHhiLas+rgHjoc2YvH+mN:X57Tcf3BcHhkTO/nYvB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1016 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1016 Au_.exe 1016 Au_.exe 1016 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral18/files/0x000c000000023b70-3.dat nsis_installer_1 behavioral18/files/0x000c000000023b70-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1016 3188 Uninstall.exe 84 PID 3188 wrote to memory of 1016 3188 Uninstall.exe 84 PID 3188 wrote to memory of 1016 3188 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5714e0ecd29f9ec555f350f38672726c7
SHA1555b1492e782d7a30f280f2aecb64c642c1aaad3
SHA25621fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3
SHA512ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
575B
MD50df22361e86478d6306ffe65d53deb94
SHA12cb467b0d33b8faf312ee4947250121999f186df
SHA2565b7c9aff6d4babc46f4e2396e43c047e985c04e15d5161f4e2ee62d118347f8f
SHA5121e980ca2f2c811050609e7dc1c518a24faa71b7d8ccd68392996cd17c445509a6fc8f86eb469e8d7aa3fb9f82239c728027b159d41161ed8daefe09776b72e2b
-
Filesize
99KB
MD5938a3a38a1f3305e267f050f4567e259
SHA15f39937c32ace402530c93a8ec445ebcfe2bfdd1
SHA256081b40881c097faa045087133cd2353386c1066f95a3f2ec2ef10a9909f3f12c
SHA512ffe97f9960fb28d68dd9659589f01894064207b2e38d23401181bc021dc6cbfa6f920010c65938e0d020068ff414fddeb7ebc190471153f420752e8581b3c86b