Overview
overview
10Static
static
31d92475e5f...18.exe
windows7-x64
101d92475e5f...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3streamTran...st.exe
windows7-x64
7streamTran...st.exe
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/splash.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/splash.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
streamTranscoderv3-uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
streamTranscoderv3-uninst.exe
Resource
win10v2004-20240419-en
General
-
Target
streamTranscoderv3-uninst.exe
-
Size
51KB
-
MD5
e3084822d9b2e96f7ed085a655df7557
-
SHA1
35af7cc3e7fa5bb907cf6bd0a2ed3d5fa48cd25f
-
SHA256
aa0e99f113c900c46e2735dae117000a71e0e1ac0bb5ce26d9629ca0751d9569
-
SHA512
81a0fdc711530d50ab4f922dbcc25d1017eee3db7f12f29afe963c4c1593644e98a1dd0fd4ac4e8153b9c59a08eb63cc29b36876dbf431579196f79470676834
-
SSDEEP
1536:kaLuXE8XPIYyr7jvN0DoJ+cKgdLeAyN04k:NLuXzXwYyr6DoocKceA8k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1284 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 streamTranscoderv3-uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral7/files/0x002c000000015cb6-2.dat nsis_installer_1 behavioral7/files/0x002c000000015cb6-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1284 Un_A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1284 3028 streamTranscoderv3-uninst.exe 28 PID 3028 wrote to memory of 1284 3028 streamTranscoderv3-uninst.exe 28 PID 3028 wrote to memory of 1284 3028 streamTranscoderv3-uninst.exe 28 PID 3028 wrote to memory of 1284 3028 streamTranscoderv3-uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\streamTranscoderv3-uninst.exe"C:\Users\Admin\AppData\Local\Temp\streamTranscoderv3-uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5e3084822d9b2e96f7ed085a655df7557
SHA135af7cc3e7fa5bb907cf6bd0a2ed3d5fa48cd25f
SHA256aa0e99f113c900c46e2735dae117000a71e0e1ac0bb5ce26d9629ca0751d9569
SHA51281a0fdc711530d50ab4f922dbcc25d1017eee3db7f12f29afe963c4c1593644e98a1dd0fd4ac4e8153b9c59a08eb63cc29b36876dbf431579196f79470676834