Overview
overview
7Static
static
35f06a605a2...18.exe
windows7-x64
75f06a605a2...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDIR/terms.rtf
windows7-x64
4$PLUGINSDIR/terms.rtf
windows10-2004-x64
1$_14_/$_14_/$_20_.exe
windows7-x64
1$_14_/$_14_/$_20_.exe
windows10-2004-x64
1$_14_/Uninstall.exe
windows7-x64
7$_14_/Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
138s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
5f06a605a226b23c3ab073d94160c9f2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f06a605a226b23c3ab073d94160c9f2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/npHelper.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/npHelper.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/terms.rtf
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/terms.rtf
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$_14_/$_14_/$_20_.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$_14_/$_14_/$_20_.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$_14_/Uninstall.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$_14_/Uninstall.exe
Resource
win10v2004-20240508-en
General
-
Target
$_14_/Uninstall.exe
-
Size
109KB
-
MD5
e129b8a705222e47225ffbb76d9724d5
-
SHA1
325920cdc1ddf65d74a74dca9dfde15e4835b7f6
-
SHA256
2f7fd012284edcff658f512dead1bc539eb1490421137d54a363728199fffcf8
-
SHA512
52d782f2698c4324b5dc8374af46ca1c369920b79942f0c55cb3c62e1876455658c75542ab1dffd5ab81c2ce213cc3a42f633938b666145f3f55fed7a5bfefd2
-
SSDEEP
3072:74lLpkXGED3iNuQZndILLBR147AcQOBjUirY:ApkXGhz7uHWbM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4556 Un_A.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4556 2692 Uninstall.exe 82 PID 2692 wrote to memory of 4556 2692 Uninstall.exe 82 PID 2692 wrote to memory of 4556 2692 Uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_14_\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$_14_\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$_14_\2⤵
- Executes dropped EXE
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5e129b8a705222e47225ffbb76d9724d5
SHA1325920cdc1ddf65d74a74dca9dfde15e4835b7f6
SHA2562f7fd012284edcff658f512dead1bc539eb1490421137d54a363728199fffcf8
SHA51252d782f2698c4324b5dc8374af46ca1c369920b79942f0c55cb3c62e1876455658c75542ab1dffd5ab81c2ce213cc3a42f633938b666145f3f55fed7a5bfefd2