Overview
overview
7Static
static
3751eea6353...18.exe
windows7-x64
7751eea6353...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3tor-gencert.html
windows7-x64
1tor-gencert.html
windows10-2004-x64
1tor-resolve.exe
windows7-x64
1tor-resolve.exe
windows10-2004-x64
1tor-resolve.html
windows7-x64
1tor-resolve.html
windows10-2004-x64
1tor-spec.js
windows7-x64
3tor-spec.js
windows10-2004-x64
3tor.exe
windows7-x64
3tor.exe
windows10-2004-x64
3tor.html
windows7-x64
1tor.html
windows10-2004-x64
1torify.html
windows7-x64
1torify.html
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
751eea6353f1c532c4cec1f8bc5952b3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
751eea6353f1c532c4cec1f8bc5952b3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
tor-gencert.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
tor-gencert.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
tor-resolve.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
tor-resolve.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
tor-resolve.html
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
tor-resolve.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
tor-spec.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
tor-spec.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
tor.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
tor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
tor.html
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
tor.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
torify.html
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
torify.html
Resource
win10v2004-20240426-en
General
-
Target
Uninstall.exe
-
Size
47KB
-
MD5
b8d84a9ef202f915b17888cc3974f138
-
SHA1
f8765afa5ffaecdafad79d8d6715927bd01305d5
-
SHA256
d77f2f3f834306a9ac154beb54eb1208499e1d27ae5c56c17ceb47b931521bd8
-
SHA512
ed71dfba38238c6a5a9c2b7936f23a7b95994dcd41026d7564f6b23aaaa6c7f395bd2e3f64f2c9f0d845db36cc29d4f0a102b51c776e441535ae746289311d2c
-
SSDEEP
768:w1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJw7EcXVjpRNtU:uQpQ5EP0ijnRTXJw7E2U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4288 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 4288 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral6/files/0x0007000000023430-5.dat nsis_installer_1 behavioral6/files/0x0007000000023430-5.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 4288 2676 Uninstall.exe 84 PID 2676 wrote to memory of 4288 2676 Uninstall.exe 84 PID 2676 wrote to memory of 4288 2676 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
568B
MD580feef20d32ca6846aa1a6722312e710
SHA1d9434f022b747f8de60da379ced14a8b7a674099
SHA25620d9d981cb78b8bb9f333f11e5fcc540a93d2b363e21684840b332ebaa0b427b
SHA512a84c97f8636ee7e7908be0901da10054fd16163b0e60e3e32a5b71cf98f80d54c042a6be8ed2c4a94c57e4cbaa7b6f4e0adcf063a1b33a995a1b71c9dc402f6b
-
Filesize
47KB
MD5b8d84a9ef202f915b17888cc3974f138
SHA1f8765afa5ffaecdafad79d8d6715927bd01305d5
SHA256d77f2f3f834306a9ac154beb54eb1208499e1d27ae5c56c17ceb47b931521bd8
SHA512ed71dfba38238c6a5a9c2b7936f23a7b95994dcd41026d7564f6b23aaaa6c7f395bd2e3f64f2c9f0d845db36cc29d4f0a102b51c776e441535ae746289311d2c