Overview
overview
4Static
static
3bd68e020d7...18.exe
windows7-x64
4bd68e020d7...18.exe
windows10-2004-x64
4$PLUGINSDI...ew.dll
windows7-x64
3$PLUGINSDI...ew.dll
windows10-2004-x64
3$PLUGINSDI...is.dll
windows7-x64
3$PLUGINSDI...is.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows7-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
1$PLUGINSDIR/inetc.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/kwun...er.exe
windows7-x64
3$TEMP/kwun...er.exe
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 17:04
Static task
static1
Behavioral task
behavioral1
Sample
bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/KuWoNsis_new.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/KuWoNsis_new.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KwMusicNsis.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KwMusicNsis.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$TEMP/kwuninsthelper.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$TEMP/kwuninsthelper.exe
Resource
win10v2004-20240508-en
General
-
Target
bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe
-
Size
858KB
-
MD5
bd68e020d796278d3683f75a0d76f52d
-
SHA1
7645095d4e50a9484f640347e3a6e3f0d53ec1d5
-
SHA256
c55732168517ea7a91d294844d2e32da201bb31e95ec484f68f29fa5efb5e08b
-
SHA512
558bc4ecad5fed3d4527a26fd021232248e5147b8c19a798b510c33f1126604f32e5bb590b1ca4ec564fb8aec18d282a2272519563534a9bfe8734e14c9faeef
-
SSDEEP
12288:g1HZBFqMkpHzHzmHdFFagEEDC111RmqmqmqmNXAXAXAEBYYAoVHzHacsimn75jRL:gZc75jRrLN2fnTaKRnw4i5EAaQd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1824 Au_.exe 2808 kwuninsthelper.exe -
Loads dropped DLL 23 IoCs
pid Process 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 1824 Au_.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe 2808 kwuninsthelper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 952 wrote to memory of 1824 952 bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2808 1824 Au_.exe 29 PID 1824 wrote to memory of 2808 1824 Au_.exe 29 PID 1824 wrote to memory of 2808 1824 Au_.exe 29 PID 1824 wrote to memory of 2808 1824 Au_.exe 29 PID 1824 wrote to memory of 2808 1824 Au_.exe 29 PID 1824 wrote to memory of 2808 1824 Au_.exe 29 PID 1824 wrote to memory of 2808 1824 Au_.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd68e020d796278d3683f75a0d76f52d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\kwuninsthelper.exe"C:\Users\Admin\AppData\Local\Temp\kwuninsthelper.exe" /MTD="cG9zdA==" /DAT="TWlVd09UeFRVa002VFZWVFNVTmZPUzR4TGpFdU1sOVFSWHhCUTFRNlRsTkpVMTlWVGtsT1UxUjhWRmxRUlRwU1ZVNVZUbE5VZkVOVlVrUlVPakU1T0RremZFbE9VMVJFVkRwOFZWTTZNVGs0T1ROOFZFTnZkVzUwT2pJMU9UTTVORE15T0h4N1kyOXdNak0wTlY5QmRWOHVaWGhsZlh4Vk9ueE5RVU02UlRaQ05UUTVSVGhDUkRnNFBnPT0=" /RES="QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGt1d29tc2dsb2cudHh0" /DST="aHR0cDovL2xvZy5rdXdvLmNuL211c2ljLnls"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5b759bbbb1af31b9fab3954360086f828
SHA1f43c8195d0d8303a316218a4958b790c4f965818
SHA2569cd242782f6c82b27396c2a1133df29cfb3498f64875e756c155dcd10a647426
SHA5121914d5d0f780d33eccddb11b244387737c8fcc18deeeca3bed50e17510f0e5a7b8850afbe99dd3cd8037720af32e8c1599fd66ed4c2d77bdb74fcc5773dc42bc
-
Filesize
70KB
MD5850740258bc04a9a60266a206a56a576
SHA1562efebbde3e3ae999081f217f50092f27ee19e5
SHA256d905aea5493481703a0be6ec70815774edfbaa75cab9d1fcd9f0ec32594b0567
SHA512da9c1e4b587ad35317810e2320ed62f1bbb353ea52477e9d466f20cad25bbe5b0bfa6746e2823d1f7d2255fdfbdd3356a67e029c5858f5823a791edd25a94bf0
-
Filesize
55KB
MD543fa0a6cde7f17e914b5087e133cbaa9
SHA11bb3e4cc98e3b65722d21425d0358e2fe93b20e9
SHA25646e26dc2255603778fd046493fae73130963c7fb365ca222105e8ea0328c485f
SHA512b2e7921e18f12703df2e08ae6edb16823ea74278980b91019272c12c516498bb6db1e0d2b422f3af2aa3d492396423cc84fe8bf43b229e4745ca4592a149f1b8
-
Filesize
298KB
MD582f572276aff5f06f55240323ad8d267
SHA10eeef4b8aa4787a3912522187855c8c0743bbca5
SHA2565f901e526effe89e783eb4acfdec0f485a465a98b9069d0b13ffd5e2ed73adfe
SHA512b29a1faa150dbe70b2cffccb233d25548c812a2f773e031b76d9de314bc33ad4dad69b821f315535dc0afdcf0e6e5749d6487ff9eecac927999b93906ec15c0b
-
Filesize
419KB
MD506029e624f1d222e59ac641b2ce426b6
SHA16ba2875bee2eae79c0e1eaa8aa236038c8db6044
SHA25609fb37e917faea5c966bc3418d1d7e46e3d0b9912cadd56486ba5bb5ac0f7b10
SHA512516c04cfc31204879a0c938961208416ddd4ca7204606d630abe860c81422aa1316e45e29669ba01a7506af3f05284395c7c46524f2e73f36d3b4274203de70b
-
Filesize
32KB
MD58b43a3f284632edfbb51665b2e0b8a3c
SHA1af6ab111856be7af7212a82b052e8b5656159b35
SHA256336e588999bf6b1cd6c894dbf5a73b2198d48c935f8b1251687845cce467dc67
SHA5123a9add285d074db534937b193b92f8e0503c94c97b11f0abe5d9358342fbc57461ba1f559fa19e0522cfec914b8a007f11bec34abef17faaca5de8bda0dbaf94
-
Filesize
11KB
MD57df8fb4196186f28cb308f9952d7ef64
SHA1f20a7259ad233ac3795b6e6537de658209a8fd40
SHA25672253837028abed272e5d50a3a6771933e9dd1aad73e90b8db4538aa9c786cbf
SHA5123f373d69664ce015ceab16c12ba4c806c3489b89ae9db282551ec2452acd2ced1d70ddd4de0ef8c56d62a715624c9d2ceddc968adf07e905f2e4c81c2850ae4b
-
Filesize
9KB
MD53ff6d8bfd6784eb4325102d9f76a0fe1
SHA11eedf67a5f3ea636bcb621402bb679d3e08c0414
SHA2566da0ec15a4d3bbcfdd82d36838abcf8d57515d06049290801e5d71b4fd021dab
SHA512dcc6c3ad393503c6527528d4fccc8b4faf25c6ff50a08c29247ab144f444d31590e3f7a581b2c955b0a109b552f0b7e3b4ae1849228d31a220d46eb5e1e2d26a
-
Filesize
858KB
MD5bd68e020d796278d3683f75a0d76f52d
SHA17645095d4e50a9484f640347e3a6e3f0d53ec1d5
SHA256c55732168517ea7a91d294844d2e32da201bb31e95ec484f68f29fa5efb5e08b
SHA512558bc4ecad5fed3d4527a26fd021232248e5147b8c19a798b510c33f1126604f32e5bb590b1ca4ec564fb8aec18d282a2272519563534a9bfe8734e14c9faeef