Overview
overview
10Static
static
37b527aa6b0...18.exe
windows7-x64
107b527aa6b0...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
7b527aa6b088479c8ae3d69ce13f374f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b527aa6b088479c8ae3d69ce13f374f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
uninstall.exe
-
Size
58KB
-
MD5
a53a912fab731bed752d8421d7de4dd2
-
SHA1
90289c2fa0c47350cd85ea1cb5d5e13de27f551a
-
SHA256
960293e0cfc7f99fe7d6f90065e3712c0ebfdfb3a259e9d2758fe305aa57c61a
-
SHA512
f9e2c3ccf04664bfd90f8d30ab35e8be64b5c6cc0b5d8d795a7d7b514a50277831637a4acbbe03113bb3c17abec9765122e3122e7c12672e278505d2d56feda6
-
SSDEEP
1536:j1E/rzW2pakRmB7BW3nKsciPgdLeAyN0X7qgFXYtP:j1E/rS2paccKntcqceAD7vFXYtP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1332 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral10/files/0x000700000002345a-4.dat nsis_installer_1 behavioral10/files/0x000700000002345a-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 320 wrote to memory of 1332 320 uninstall.exe 83 PID 320 wrote to memory of 1332 320 uninstall.exe 83 PID 320 wrote to memory of 1332 320 uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5a53a912fab731bed752d8421d7de4dd2
SHA190289c2fa0c47350cd85ea1cb5d5e13de27f551a
SHA256960293e0cfc7f99fe7d6f90065e3712c0ebfdfb3a259e9d2758fe305aa57c61a
SHA512f9e2c3ccf04664bfd90f8d30ab35e8be64b5c6cc0b5d8d795a7d7b514a50277831637a4acbbe03113bb3c17abec9765122e3122e7c12672e278505d2d56feda6