Overview
overview
10Static
static
34e411c2df1...18.exe
windows7-x64
104e411c2df1...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3_class.noobSlide.js
windows7-x64
3_class.noobSlide.js
windows10-2004-x64
3jqueryVali...18n.js
windows7-x64
3jqueryVali...18n.js
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
4e411c2df17b88a85174574c5cdb51da_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e411c2df17b88a85174574c5cdb51da_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
_class.noobSlide.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
_class.noobSlide.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
jqueryValidatorI18n.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
jqueryValidatorI18n.js
Resource
win10v2004-20240226-en
General
-
Target
Uninstall.exe
-
Size
62KB
-
MD5
29f0f324b768eb010d87a47e027b3e70
-
SHA1
419be293b9ff59e114fb55d8e8701f78066e053b
-
SHA256
35c51add1ca10d624e871df527af21055af029c7e2e4746bb239096af52dc238
-
SHA512
589fb83f929608b71aa87080ff4a7f206b605c329b3eb082676fc75dff6617698e192a785107a4bce6bf6b9d4abc3a7d4bd7715fd991570b8ad04778e71a6114
-
SSDEEP
1536:RTdm9B9lYypfMXvugHQ0DbLiNuMgdLeAyNxWpNUT7H:R4lLpkXGED3iNuMceA9I7H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 Un_A.exe -
Loads dropped DLL 3 IoCs
pid Process 1928 Uninstall.exe 2208 Un_A.exe 2208 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 Un_A.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2208 1928 Uninstall.exe 28 PID 1928 wrote to memory of 2208 1928 Uninstall.exe 28 PID 1928 wrote to memory of 2208 1928 Uninstall.exe 28 PID 1928 wrote to memory of 2208 1928 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
4KB
MD5b98f45a83c1d09132e1e4ada1387a6f8
SHA19f0a343ec5060b269d36fe1045cff14185f15d1b
SHA25623661a4b1f3d6744fcdd1b2379e5e602e6cf6bd5950b2d19b844527b2f626e99
SHA512cb446acd93c4dd79e81b920075a7055140b27d3e83b43ad899736a0d37e709974b27c5340a4b864e3b41714523dd4daee07b506a2c40b36f9b9d05fdd5cc2612
-
Filesize
62KB
MD529f0f324b768eb010d87a47e027b3e70
SHA1419be293b9ff59e114fb55d8e8701f78066e053b
SHA25635c51add1ca10d624e871df527af21055af029c7e2e4746bb239096af52dc238
SHA512589fb83f929608b71aa87080ff4a7f206b605c329b3eb082676fc75dff6617698e192a785107a4bce6bf6b9d4abc3a7d4bd7715fd991570b8ad04778e71a6114