Overview
overview
10Static
static
34e411c2df1...18.exe
windows7-x64
104e411c2df1...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3_class.noobSlide.js
windows7-x64
3_class.noobSlide.js
windows10-2004-x64
3jqueryVali...18n.js
windows7-x64
3jqueryVali...18n.js
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
4e411c2df17b88a85174574c5cdb51da_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e411c2df17b88a85174574c5cdb51da_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
_class.noobSlide.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
_class.noobSlide.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
jqueryValidatorI18n.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
jqueryValidatorI18n.js
Resource
win10v2004-20240226-en
General
-
Target
Uninstall.exe
-
Size
62KB
-
MD5
29f0f324b768eb010d87a47e027b3e70
-
SHA1
419be293b9ff59e114fb55d8e8701f78066e053b
-
SHA256
35c51add1ca10d624e871df527af21055af029c7e2e4746bb239096af52dc238
-
SHA512
589fb83f929608b71aa87080ff4a7f206b605c329b3eb082676fc75dff6617698e192a785107a4bce6bf6b9d4abc3a7d4bd7715fd991570b8ad04778e71a6114
-
SSDEEP
1536:RTdm9B9lYypfMXvugHQ0DbLiNuMgdLeAyNxWpNUT7H:R4lLpkXGED3iNuMceA9I7H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Un_A.exepid process 2208 Un_A.exe -
Loads dropped DLL 3 IoCs
Processes:
Uninstall.exeUn_A.exepid process 1928 Uninstall.exe 2208 Un_A.exe 2208 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Un_A.exepid process 2208 Un_A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Uninstall.exedescription pid process target process PID 1928 wrote to memory of 2208 1928 Uninstall.exe Un_A.exe PID 1928 wrote to memory of 2208 1928 Uninstall.exe Un_A.exe PID 1928 wrote to memory of 2208 1928 Uninstall.exe Un_A.exe PID 1928 wrote to memory of 2208 1928 Uninstall.exe Un_A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsy2C01.tmp\System.dllFilesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
\Users\Admin\AppData\Local\Temp\nsy2C01.tmp\UserInfo.dllFilesize
4KB
MD5b98f45a83c1d09132e1e4ada1387a6f8
SHA19f0a343ec5060b269d36fe1045cff14185f15d1b
SHA25623661a4b1f3d6744fcdd1b2379e5e602e6cf6bd5950b2d19b844527b2f626e99
SHA512cb446acd93c4dd79e81b920075a7055140b27d3e83b43ad899736a0d37e709974b27c5340a4b864e3b41714523dd4daee07b506a2c40b36f9b9d05fdd5cc2612
-
\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exeFilesize
62KB
MD529f0f324b768eb010d87a47e027b3e70
SHA1419be293b9ff59e114fb55d8e8701f78066e053b
SHA25635c51add1ca10d624e871df527af21055af029c7e2e4746bb239096af52dc238
SHA512589fb83f929608b71aa87080ff4a7f206b605c329b3eb082676fc75dff6617698e192a785107a4bce6bf6b9d4abc3a7d4bd7715fd991570b8ad04778e71a6114