Overview
overview
7Static
static
33093678f31...18.exe
windows7-x64
73093678f31...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3ShowImage.exe
windows7-x64
1ShowImage.exe
windows10-2004-x64
1SmileScreenShot.exe
windows7-x64
1SmileScreenShot.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
3093678f3170aca9b98e852570e6fa54_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3093678f3170aca9b98e852570e6fa54_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
ShowImage.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
ShowImage.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
SmileScreenShot.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
SmileScreenShot.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240508-en
General
-
Target
uninst.exe
-
Size
52KB
-
MD5
350802dbaa4cfbdaac49d0542ff0859d
-
SHA1
a412e6334c818bde856a1771c83b6b6d1877530f
-
SHA256
d8c796e7518ceb8d9add1ca94d8dc0991d7fc3eb520ba5043adb67da03dfea9a
-
SHA512
3162e846cf735978db5ea828b8e0b13215610e1960c7ab96f1b1cfe329209d286e035343d52563f47c55b5bd07576ae975f3cfb43fc0e8837a288b45e13706d6
-
SSDEEP
768:CUEx8n86PUQ1cFpl+Bd7it9igPfORwhIj8d+thiNcM9atgd2iZQAm6kRRS+NoJRJ:uiTPUgOplcC2RVhiNctgdLeAyNZe3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1708 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x00350000000165d4-2.dat nsis_installer_1 behavioral11/files/0x00350000000165d4-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1708 2176 uninst.exe 28 PID 2176 wrote to memory of 1708 2176 uninst.exe 28 PID 2176 wrote to memory of 1708 2176 uninst.exe 28 PID 2176 wrote to memory of 1708 2176 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5350802dbaa4cfbdaac49d0542ff0859d
SHA1a412e6334c818bde856a1771c83b6b6d1877530f
SHA256d8c796e7518ceb8d9add1ca94d8dc0991d7fc3eb520ba5043adb67da03dfea9a
SHA5123162e846cf735978db5ea828b8e0b13215610e1960c7ab96f1b1cfe329209d286e035343d52563f47c55b5bd07576ae975f3cfb43fc0e8837a288b45e13706d6