Overview
overview
9Static
static
9399d264c0a...18.exe
windows7-x64
7399d264c0a...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DuiLib.dll
windows7-x64
3DuiLib.dll
windows10-2004-x64
3DuiLib_u.dll
windows7-x64
3DuiLib_u.dll
windows10-2004-x64
3MeMeLiveShow.exe
windows7-x64
1MeMeLiveShow.exe
windows10-2004-x64
1UninstallMeMeLive.exe
windows7-x64
7UninstallMeMeLive.exe
windows10-2004-x64
7installstat.exe
windows7-x64
1installstat.exe
windows10-2004-x64
1plugins/NP...09.dll
windows7-x64
1plugins/NP...09.dll
windows10-2004-x64
1update.exe
windows7-x64
1update.exe
windows10-2004-x64
1wke.dll
windows7-x64
1wke.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 10:21
Behavioral task
behavioral1
Sample
399d264c0aa7a682451fb3f6cc3cd38a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
399d264c0aa7a682451fb3f6cc3cd38a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DuiLib.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
DuiLib.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
DuiLib_u.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
DuiLib_u.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
MeMeLiveShow.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
MeMeLiveShow.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
UninstallMeMeLive.exe
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
UninstallMeMeLive.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
installstat.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
installstat.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
plugins/NPSWF32_18_0_0_209.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
plugins/NPSWF32_18_0_0_209.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
update.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
update.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
wke.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
wke.dll
Resource
win10v2004-20240508-en
General
-
Target
UninstallMeMeLive.exe
-
Size
394KB
-
MD5
5b4c0f4589753cf28114c0cf73a729a8
-
SHA1
aeaa96eff6b4a43c0761b418119fb0fb96aa5073
-
SHA256
a186be7d61b6ac54de13410110086f81fdded6987182d15867cb45a104c236cc
-
SHA512
c343835c4cc5d9f6a3b4cea080e4d592f83563966b65e978aed5c93a5b9891eb97a246b1b36e68ec911142a903f8156d2f8340c6a1c50a7294b61eaf5e14d8a4
-
SSDEEP
1536:ZPzUmdx2gahvwPBW7rfoOcZ1VBBUY5zQVmp2A:ZPzUQ2gyYqrf5cZ1bBPtUmpp
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
Un_A.exepid process 3424 Un_A.exe -
Executes dropped EXE 1 IoCs
Processes:
Un_A.exepid process 3424 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
UninstallMeMeLive.exedescription pid process target process PID 3824 wrote to memory of 3424 3824 UninstallMeMeLive.exe Un_A.exe PID 3824 wrote to memory of 3424 3824 UninstallMeMeLive.exe Un_A.exe PID 3824 wrote to memory of 3424 3824 UninstallMeMeLive.exe Un_A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UninstallMeMeLive.exe"C:\Users\Admin\AppData\Local\Temp\UninstallMeMeLive.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
PID:3424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD55b4c0f4589753cf28114c0cf73a729a8
SHA1aeaa96eff6b4a43c0761b418119fb0fb96aa5073
SHA256a186be7d61b6ac54de13410110086f81fdded6987182d15867cb45a104c236cc
SHA512c343835c4cc5d9f6a3b4cea080e4d592f83563966b65e978aed5c93a5b9891eb97a246b1b36e68ec911142a903f8156d2f8340c6a1c50a7294b61eaf5e14d8a4