Overview
overview
4Static
static
35b4d4e5e9c...18.exe
windows7-x64
45b4d4e5e9c...18.exe
windows10-2004-x64
4$PLUGINSDI...ew.dll
windows7-x64
3$PLUGINSDI...ew.dll
windows10-2004-x64
3$PLUGINSDI...is.dll
windows7-x64
3$PLUGINSDI...is.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows7-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
1$PLUGINSDIR/inetc.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/kwun...er.exe
windows7-x64
3$TEMP/kwun...er.exe
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/KuWoNsis_new.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/KuWoNsis_new.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KwMusicNsis.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KwMusicNsis.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/kwuninsthelper.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$TEMP/kwuninsthelper.exe
Resource
win10v2004-20240226-en
General
-
Target
5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe
-
Size
666KB
-
MD5
5b4d4e5e9cd2c1d4518e823c6f62f92b
-
SHA1
fda9f7d1e8305d3187137afd53dbddfb2b40d52f
-
SHA256
b29ad0aa376658bc8d2343aac56e35f9e7ffbdd1e6110aef19beaeb6a8a51b31
-
SHA512
8f322691cf46fb33c7754c9f9092daf94dca031c4a2c8fd565cbb269dd7e415a1643b25444e8ded4c39e08f1555bbfc464a880b31a2bceebd21e7044479b7ba6
-
SSDEEP
12288:q1H2Bws6vFhIExmyCDU99V78xLupdZYJfVL9N3kOiqhBK0wr9+Am1ID:qyuLay+W9sufZ+L9NUfq9G9ZmqD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3280 Au_.exe 1260 kwuninsthelper.exe -
Loads dropped DLL 22 IoCs
pid Process 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 3280 Au_.exe 1260 kwuninsthelper.exe 1260 kwuninsthelper.exe 1260 kwuninsthelper.exe 1260 kwuninsthelper.exe 1260 kwuninsthelper.exe 1260 kwuninsthelper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3280 2220 5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe 82 PID 2220 wrote to memory of 3280 2220 5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe 82 PID 2220 wrote to memory of 3280 2220 5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe 82 PID 3280 wrote to memory of 1260 3280 Au_.exe 83 PID 3280 wrote to memory of 1260 3280 Au_.exe 83 PID 3280 wrote to memory of 1260 3280 Au_.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b4d4e5e9cd2c1d4518e823c6f62f92b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\kwuninsthelper.exe"C:\Users\Admin\AppData\Local\Temp\kwuninsthelper.exe" /MTD="cG9zdA==" /DAT="TWlVd09UeFRVa002VFZWVFNVTmZPUzR3TGpRdU1GOUNRMU14Tlh4QlExUTZUbE5KVTE5VlRrbE9VMVI4VkZsUVJUcFNWVTVWVGxOVWZFTlZVa1JVT2pFNU9EWXlmRWxPVTFSRVZEcDhWVk02TVRrNE5qSjhWRU52ZFc1ME9qSTBNRFl3TXpVd01IeDdRWFZmTG1WNFpYMThWVHA4VFVGRE9rWXlRVU00UVVZMFJETXhPVDQ9" /RES="QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGt1d29tc2dsb2cudHh0" /DST="aHR0cDovL2xvZy5rdXdvLmNuL211c2ljLnls"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5b759bbbb1af31b9fab3954360086f828
SHA1f43c8195d0d8303a316218a4958b790c4f965818
SHA2569cd242782f6c82b27396c2a1133df29cfb3498f64875e756c155dcd10a647426
SHA5121914d5d0f780d33eccddb11b244387737c8fcc18deeeca3bed50e17510f0e5a7b8850afbe99dd3cd8037720af32e8c1599fd66ed4c2d77bdb74fcc5773dc42bc
-
Filesize
70KB
MD5850740258bc04a9a60266a206a56a576
SHA1562efebbde3e3ae999081f217f50092f27ee19e5
SHA256d905aea5493481703a0be6ec70815774edfbaa75cab9d1fcd9f0ec32594b0567
SHA512da9c1e4b587ad35317810e2320ed62f1bbb353ea52477e9d466f20cad25bbe5b0bfa6746e2823d1f7d2255fdfbdd3356a67e029c5858f5823a791edd25a94bf0
-
Filesize
55KB
MD543fa0a6cde7f17e914b5087e133cbaa9
SHA11bb3e4cc98e3b65722d21425d0358e2fe93b20e9
SHA25646e26dc2255603778fd046493fae73130963c7fb365ca222105e8ea0328c485f
SHA512b2e7921e18f12703df2e08ae6edb16823ea74278980b91019272c12c516498bb6db1e0d2b422f3af2aa3d492396423cc84fe8bf43b229e4745ca4592a149f1b8
-
Filesize
296KB
MD537465ad07dca1c03e08d4c22f41a07ab
SHA120466d2936fcbaf85008b4ffe5e6bc37cada0af7
SHA2560adaa9dfd9faefc20c996897afa4c97e68b93c5da5fdd8fd8c0e4818a7c16b86
SHA512bbc16a01f2d83c05c6ca20feaa3f1fe9de06724313930589fc31dd81fa44853717ac35364a4881d5d09b8538695bc44a919bf180e047379e78921530af02b6dd
-
Filesize
419KB
MD506029e624f1d222e59ac641b2ce426b6
SHA16ba2875bee2eae79c0e1eaa8aa236038c8db6044
SHA25609fb37e917faea5c966bc3418d1d7e46e3d0b9912cadd56486ba5bb5ac0f7b10
SHA512516c04cfc31204879a0c938961208416ddd4ca7204606d630abe860c81422aa1316e45e29669ba01a7506af3f05284395c7c46524f2e73f36d3b4274203de70b
-
Filesize
32KB
MD58b43a3f284632edfbb51665b2e0b8a3c
SHA1af6ab111856be7af7212a82b052e8b5656159b35
SHA256336e588999bf6b1cd6c894dbf5a73b2198d48c935f8b1251687845cce467dc67
SHA5123a9add285d074db534937b193b92f8e0503c94c97b11f0abe5d9358342fbc57461ba1f559fa19e0522cfec914b8a007f11bec34abef17faaca5de8bda0dbaf94
-
Filesize
11KB
MD57df8fb4196186f28cb308f9952d7ef64
SHA1f20a7259ad233ac3795b6e6537de658209a8fd40
SHA25672253837028abed272e5d50a3a6771933e9dd1aad73e90b8db4538aa9c786cbf
SHA5123f373d69664ce015ceab16c12ba4c806c3489b89ae9db282551ec2452acd2ced1d70ddd4de0ef8c56d62a715624c9d2ceddc968adf07e905f2e4c81c2850ae4b
-
Filesize
9KB
MD53ff6d8bfd6784eb4325102d9f76a0fe1
SHA11eedf67a5f3ea636bcb621402bb679d3e08c0414
SHA2566da0ec15a4d3bbcfdd82d36838abcf8d57515d06049290801e5d71b4fd021dab
SHA512dcc6c3ad393503c6527528d4fccc8b4faf25c6ff50a08c29247ab144f444d31590e3f7a581b2c955b0a109b552f0b7e3b4ae1849228d31a220d46eb5e1e2d26a
-
Filesize
666KB
MD55b4d4e5e9cd2c1d4518e823c6f62f92b
SHA1fda9f7d1e8305d3187137afd53dbddfb2b40d52f
SHA256b29ad0aa376658bc8d2343aac56e35f9e7ffbdd1e6110aef19beaeb6a8a51b31
SHA5128f322691cf46fb33c7754c9f9092daf94dca031c4a2c8fd565cbb269dd7e415a1643b25444e8ded4c39e08f1555bbfc464a880b31a2bceebd21e7044479b7ba6