Overview
overview
7Static
static
34ab5a4dcc4...18.exe
windows7-x64
74ab5a4dcc4...18.exe
windows10-2004-x64
7$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
4ab5a4dcc480595aa5161d3302ef6fdf_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ab5a4dcc480595aa5161d3302ef6fdf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240426-en
General
-
Target
uninst.exe
-
Size
194KB
-
MD5
0a38eb0955c70aceb0233401d9501c4e
-
SHA1
ee2166bcf9d65f878e82bd04bd21868100afda21
-
SHA256
436a122419f09deed39a5a650e282c7a3ba5700a2a52b4f199209270896d6791
-
SHA512
9df8522a27b22d5e45069918500f7859c85af9465bff2bc68f143a8411259c2a0ea380a0fa7377595e459c8bc066d2bd87a725c852564ee2bcd021a160e786d8
-
SSDEEP
3072:BgXdZt9P6D3XJcRow6nVIDIaT4Lhqd+Z9VdqN6VmvvxRt8aGAbT1oBRZ5r:Be34KRxhY9j/u3CaXFeZJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 2032 uninst.exe 2564 Au_.exe 2564 Au_.exe 2564 Au_.exe 2564 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral19/files/0x003700000001640f-2.dat nsis_installer_1 behavioral19/files/0x003700000001640f-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2564 2032 uninst.exe 28 PID 2032 wrote to memory of 2564 2032 uninst.exe 28 PID 2032 wrote to memory of 2564 2032 uninst.exe 28 PID 2032 wrote to memory of 2564 2032 uninst.exe 28 PID 2032 wrote to memory of 2564 2032 uninst.exe 28 PID 2032 wrote to memory of 2564 2032 uninst.exe 28 PID 2032 wrote to memory of 2564 2032 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a401e590877ef6c928d2a97c66157094
SHA175e24799cf67e789fadcc8b7fddefc72fdc4cd61
SHA2562a7f33ef64d666a42827c4dc377806ad97bc233819197adf9696aed5be5efac0
SHA5126093415cd090e69cdcb52b5d381d0a8b3e9e5479dac96be641e0071f1add26403b27a453febd8ccfd16393dc1caa03404a369c768a580781aba3068415ee993f
-
Filesize
194KB
MD50a38eb0955c70aceb0233401d9501c4e
SHA1ee2166bcf9d65f878e82bd04bd21868100afda21
SHA256436a122419f09deed39a5a650e282c7a3ba5700a2a52b4f199209270896d6791
SHA5129df8522a27b22d5e45069918500f7859c85af9465bff2bc68f143a8411259c2a0ea380a0fa7377595e459c8bc066d2bd87a725c852564ee2bcd021a160e786d8