Overview
overview
7Static
static
30860287445...18.exe
windows7-x64
70860287445...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.exe
windows7-x64
1$PLUGINSDI...ll.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AutoShutdown.exe
windows7-x64
1AutoShutdown.exe
windows10-2004-x64
1ClonedFileCleaner.exe
windows7-x64
1ClonedFileCleaner.exe
windows10-2004-x64
1FilePulverizer.exe
windows7-x64
1FilePulverizer.exe
windows10-2004-x64
1StartupManager.exe
windows7-x64
1StartupManager.exe
windows10-2004-x64
1SweepHelper.exe
windows7-x64
1SweepHelper.exe
windows10-2004-x64
1SystemInformation.exe
windows7-x64
1SystemInformation.exe
windows10-2004-x64
1SystemSpee...er.exe
windows7-x64
3SystemSpee...er.exe
windows10-2004-x64
7res/info.html
windows7-x64
1res/info.html
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
0860287445de58569923bee93cc01758_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0860287445de58569923bee93cc01758_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckInstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CheckInstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
AutoShutdown.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
AutoShutdown.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
ClonedFileCleaner.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
ClonedFileCleaner.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
FilePulverizer.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
FilePulverizer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
StartupManager.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
StartupManager.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
SweepHelper.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
SweepHelper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SystemInformation.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
SystemInformation.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
SystemSpeedBooster.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
SystemSpeedBooster.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
res/info.html
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
res/info.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uninst.exe
Resource
win10v2004-20240611-en
General
-
Target
uninst.exe
-
Size
65KB
-
MD5
9441d6915ef048a2dfd3e05fd6e78a83
-
SHA1
32b07835a24dd627c643bd185bb005ef44dd0e59
-
SHA256
e17fc60e92bd169785257d692be15a9a735bdcd163c655db0c9b58f29258eeeb
-
SHA512
76007f695f2c52021f2fa8115a1b93b24965d009db2a1566f30c31a2bd5db5d6a51e850eb114f94fe681198c2a7716c5b94c7a3992acc505a10c7b30b272177c
-
SSDEEP
1536:VQpQ5EP0ijnRTXJzEBhHRtBlTo0dfUAFhdZ:VQIURTXJCRlTFdhn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2664 uninst.exe 2996 Au_.exe 2996 Au_.exe 2996 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral23/files/0x0005000000019241-2.dat nsis_installer_1 behavioral23/files/0x0005000000019241-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2996 2664 uninst.exe 28 PID 2664 wrote to memory of 2996 2664 uninst.exe 28 PID 2664 wrote to memory of 2996 2664 uninst.exe 28 PID 2664 wrote to memory of 2996 2664 uninst.exe 28 PID 2664 wrote to memory of 2996 2664 uninst.exe 28 PID 2664 wrote to memory of 2996 2664 uninst.exe 28 PID 2664 wrote to memory of 2996 2664 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD59441d6915ef048a2dfd3e05fd6e78a83
SHA132b07835a24dd627c643bd185bb005ef44dd0e59
SHA256e17fc60e92bd169785257d692be15a9a735bdcd163c655db0c9b58f29258eeeb
SHA51276007f695f2c52021f2fa8115a1b93b24965d009db2a1566f30c31a2bd5db5d6a51e850eb114f94fe681198c2a7716c5b94c7a3992acc505a10c7b30b272177c