Overview
overview
7Static
static
3751eea6353...18.exe
windows7-x64
7751eea6353...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3tor-gencert.html
windows7-x64
1tor-gencert.html
windows10-2004-x64
1tor-resolve.exe
windows7-x64
1tor-resolve.exe
windows10-2004-x64
1tor-resolve.html
windows7-x64
1tor-resolve.html
windows10-2004-x64
1tor-spec.js
windows7-x64
3tor-spec.js
windows10-2004-x64
3tor.exe
windows7-x64
3tor.exe
windows10-2004-x64
3tor.html
windows7-x64
1tor.html
windows10-2004-x64
1torify.html
windows7-x64
1torify.html
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
751eea6353f1c532c4cec1f8bc5952b3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
751eea6353f1c532c4cec1f8bc5952b3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
tor-gencert.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
tor-gencert.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
tor-resolve.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
tor-resolve.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
tor-resolve.html
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
tor-resolve.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
tor-spec.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
tor-spec.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
tor.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
tor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
tor.html
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
tor.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
torify.html
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
torify.html
Resource
win10v2004-20240426-en
General
-
Target
Uninstall.exe
-
Size
47KB
-
MD5
b8d84a9ef202f915b17888cc3974f138
-
SHA1
f8765afa5ffaecdafad79d8d6715927bd01305d5
-
SHA256
d77f2f3f834306a9ac154beb54eb1208499e1d27ae5c56c17ceb47b931521bd8
-
SHA512
ed71dfba38238c6a5a9c2b7936f23a7b95994dcd41026d7564f6b23aaaa6c7f395bd2e3f64f2c9f0d845db36cc29d4f0a102b51c776e441535ae746289311d2c
-
SSDEEP
768:w1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJw7EcXVjpRNtU:uQpQ5EP0ijnRTXJw7E2U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2284 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 1692 Uninstall.exe 2284 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral5/files/0x0005000000019520-2.dat nsis_installer_1 behavioral5/files/0x0005000000019520-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2284 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2284 1692 Uninstall.exe 28 PID 1692 wrote to memory of 2284 1692 Uninstall.exe 28 PID 1692 wrote to memory of 2284 1692 Uninstall.exe 28 PID 1692 wrote to memory of 2284 1692 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581B
MD579b4a862f1dec8ee6f0fa94148bc8d72
SHA11cf653fff1fb8d94121e7ae818f0eb3c8bd03213
SHA256b8c8059d22c1ee0edcb1a981656bc90cc1173cb609921d4eed6b2524a56c02aa
SHA5127b283be7fc4dc6e5923c02c1c86bcb94b09f4949dfdf0df79fbf1985b5fbb99b0a78701e463bf33a49d950c00f836d6a9c9228f2685fbb009705734b551ff631
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
47KB
MD5b8d84a9ef202f915b17888cc3974f138
SHA1f8765afa5ffaecdafad79d8d6715927bd01305d5
SHA256d77f2f3f834306a9ac154beb54eb1208499e1d27ae5c56c17ceb47b931521bd8
SHA512ed71dfba38238c6a5a9c2b7936f23a7b95994dcd41026d7564f6b23aaaa6c7f395bd2e3f64f2c9f0d845db36cc29d4f0a102b51c776e441535ae746289311d2c