Overview
overview
7Static
static
30444d43e94...18.exe
windows7-x64
30444d43e94...18.exe
windows10-2004-x64
3$SYSDIR/Wi...er.scr
windows7-x64
1$SYSDIR/Wi...er.scr
windows10-2004-x64
1$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
1tbu03852/options.html
windows10-2004-x64
1tbu03852/s...g.html
windows7-x64
1tbu03852/s...g.html
windows10-2004-x64
1tbu03852/s...b.html
windows7-x64
1tbu03852/s...b.html
windows10-2004-x64
1tbu03852/tbhelper.dll
windows7-x64
1tbu03852/tbhelper.dll
windows10-2004-x64
1tbu03852/t...091.js
windows7-x64
3tbu03852/t...091.js
windows10-2004-x64
3tbu03852/u...ll.exe
windows7-x64
1tbu03852/u...ll.exe
windows10-2004-x64
1tbu03852/update.exe
windows7-x64
1tbu03852/update.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
0444d43e941483a911b6571e8886cbcb_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0444d43e941483a911b6571e8886cbcb_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$SYSDIR/Will.I.Am_Screensaver.scr
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$SYSDIR/Will.I.Am_Screensaver.scr
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/dospop.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
tbu03852/dospop.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
tbu03852/options.html
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
tbu03852/options.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
tbu03852/static_img.html
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
tbu03852/static_img.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
tbu03852/static_pub.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
tbu03852/static_pub.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
tbu03852/tbhelper.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
tbu03852/uninstall.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
tbu03852/update.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
tbu03852/update.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
6eba6762b7e34e64b0706343881c3d38
-
SHA1
60fd6c08a79f436e98948477506a249458213780
-
SHA256
63436d40a030822afc784bcc6a773bb3281c1e0d6aa1f3ae8af79c24efe76a5a
-
SHA512
df409271beb074834a4f0ba1ab1990463bc86bb01c439adde0e4fde625c805f7b0d5b2c85aa89c03989dcc1a7d23dcbbec9c3f6b171652c595c7af923df96983
-
SSDEEP
1536:DRf1o2Ca7qiagSshdS0D6mJjgdLeAyNLv:Dpj7EUbD6mJjceAE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid process 4416 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Uninstall.exedescription pid process target process PID 2552 wrote to memory of 4416 2552 Uninstall.exe Au_.exe PID 2552 wrote to memory of 4416 2552 Uninstall.exe Au_.exe PID 2552 wrote to memory of 4416 2552 Uninstall.exe Au_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:4416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4020,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:81⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD56eba6762b7e34e64b0706343881c3d38
SHA160fd6c08a79f436e98948477506a249458213780
SHA25663436d40a030822afc784bcc6a773bb3281c1e0d6aa1f3ae8af79c24efe76a5a
SHA512df409271beb074834a4f0ba1ab1990463bc86bb01c439adde0e4fde625c805f7b0d5b2c85aa89c03989dcc1a7d23dcbbec9c3f6b171652c595c7af923df96983