Overview
overview
7Static
static
3a64a48f73e...18.exe
windows7-x64
7a64a48f73e...18.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3BaiduPlaye...68.exe
windows7-x64
3BaiduPlaye...68.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
a64a48f73e551ebcb08dddc3f91a808c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a64a48f73e551ebcb08dddc3f91a808c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
BaiduPlayerNetSetup_368.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
BaiduPlayerNetSetup_368.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
General
-
Target
Uninstall.exe
-
Size
70KB
-
MD5
261884d819280564428fcdd1838f10e9
-
SHA1
cb8bc90c7cb5cc2cc366dc194e2a4985d117f898
-
SHA256
f30de4459e06ae84bf9b61cfb229fdb2af607f9d0ca553dea0399f3561788740
-
SHA512
fe2cb5d09a4692f0354d48da06d77d6bc7f31f54f72cca30ee2b6bed5d4839ae4586693f3e052505cfb70bc765a8ed26cff124424e8d79d684fcff0ef135d45f
-
SSDEEP
1536:myZMSZFvknTePMZd4k4kJJ7O5b3R23RB9mixpsMmy67j21v/hZ:hZMJnTeM4cJJ03CQMm77j2NZZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2632 Au_.exe -
Loads dropped DLL 52 IoCs
pid Process 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral16/files/0x0007000000023433-4.dat nsis_installer_1 behavioral16/files/0x0007000000023433-4.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe 2632 Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2632 3228 Uninstall.exe 82 PID 3228 wrote to memory of 2632 3228 Uninstall.exe 82 PID 3228 wrote to memory of 2632 3228 Uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f0e3845fefd227d7f1101850410ec849
SHA13067203fafd4237be0c186ddab7029dfcbdfb53e
SHA2567c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554
SHA512584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
70KB
MD5261884d819280564428fcdd1838f10e9
SHA1cb8bc90c7cb5cc2cc366dc194e2a4985d117f898
SHA256f30de4459e06ae84bf9b61cfb229fdb2af607f9d0ca553dea0399f3561788740
SHA512fe2cb5d09a4692f0354d48da06d77d6bc7f31f54f72cca30ee2b6bed5d4839ae4586693f3e052505cfb70bc765a8ed26cff124424e8d79d684fcff0ef135d45f