Overview
overview
7Static
static
3264b27b9ac...18.exe
windows7-x64
7264b27b9ac...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3pluginsetupadmin.exe
windows7-x64
4pluginsetupadmin.exe
windows10-2004-x64
4sz.exe
windows7-x64
1sz.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
264b27b9ac7ac6874e50d073638930b5_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
264b27b9ac7ac6874e50d073638930b5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
pluginsetupadmin.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
pluginsetupadmin.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
sz.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
sz.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
General
-
Target
uninst.exe
-
Size
400KB
-
MD5
7ded51e887171a321fd7f5f59925ea42
-
SHA1
2d2654c5e0c4fb557383842a7de1c2036a2f569c
-
SHA256
1cb9f1b81e6c5b98feddee92c9d14fff89d4b111b0c0974c6e804d7dfdc36bdb
-
SHA512
980489325baa4c17d727334076e4228d582afe0884548bc132f4991cca6e96a92605c9b777af0b62162f90a326ee1145d2dcb056fc30390b28d6c9f015138827
-
SSDEEP
6144:H8LxBH3+tUVHZfKfj+v9ETgRPOILnMLPAiaINBIs/IYlAJA3Tfk6:M+tUT7OKMLPTaINBIs/nAW3Q6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2888 uninst.exe 2384 Au_.exe 2384 Au_.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 sz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral17/files/0x0009000000015018-5.dat nsis_installer_1 behavioral17/files/0x0009000000015018-5.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2384 Au_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 Au_.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2888 wrote to memory of 2384 2888 uninst.exe 28 PID 2384 wrote to memory of 2740 2384 Au_.exe 29 PID 2384 wrote to memory of 2740 2384 Au_.exe 29 PID 2384 wrote to memory of 2740 2384 Au_.exe 29 PID 2384 wrote to memory of 2740 2384 Au_.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\sz.exe"C:\Users\Admin\AppData\Local\Temp\sz.exe" /uninstallsucc3⤵
- Writes to the Master Boot Record (MBR)
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD57ded51e887171a321fd7f5f59925ea42
SHA12d2654c5e0c4fb557383842a7de1c2036a2f569c
SHA2561cb9f1b81e6c5b98feddee92c9d14fff89d4b111b0c0974c6e804d7dfdc36bdb
SHA512980489325baa4c17d727334076e4228d582afe0884548bc132f4991cca6e96a92605c9b777af0b62162f90a326ee1145d2dcb056fc30390b28d6c9f015138827
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8