Overview
overview
7Static
static
307a3273b99...18.exe
windows7-x64
707a3273b99...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
1$PLUGINSDI...te.dll
windows10-2004-x64
1EBcds.exe
windows7-x64
1EBcds.exe
windows10-2004-x64
1EBcdssvc.exe
windows7-x64
5EBcdssvc.exe
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
07a3273b9918b7ecbd2a22b3a8e61bc1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07a3273b9918b7ecbd2a22b3a8e61bc1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
EBcds.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
EBcds.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
EBcdssvc.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
EBcdssvc.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
General
-
Target
uninstall.exe
-
Size
52KB
-
MD5
3d17a6e8d6e11feb3af9d05f5f198a54
-
SHA1
f04819e1107659307af42a7a8de26212773d5386
-
SHA256
add2f9fd39dbd2524494bcee7746cea84e45d600ea0c40b86bf2793718a73103
-
SHA512
98fcac43cdb259e8afb061bc1d96f535c15aab61dd51cdcd12b90615e6210c5a2a8b49c1983da5ad80d74db31d3ff675fd977c17acfdb00221166e2763134338
-
SSDEEP
1536:ApgpHzb9dZVX9fHMvG0D3XJkpSaLEYdVN25+Ql:WgXdZt9P6D3XJ6SsNzQl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 Au_.exe -
Loads dropped DLL 6 IoCs
pid Process 2432 uninstall.exe 2096 Au_.exe 2096 Au_.exe 2096 Au_.exe 2096 Au_.exe 2096 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x00310000000144d6-2.dat nsis_installer_1 behavioral11/files/0x00310000000144d6-2.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2096 Au_.exe 2096 Au_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2432 wrote to memory of 2096 2432 uninstall.exe 28 PID 2096 wrote to memory of 2740 2096 Au_.exe 29 PID 2096 wrote to memory of 2740 2096 Au_.exe 29 PID 2096 wrote to memory of 2740 2096 Au_.exe 29 PID 2096 wrote to memory of 2740 2096 Au_.exe 29 PID 2096 wrote to memory of 2740 2096 Au_.exe 29 PID 2096 wrote to memory of 2740 2096 Au_.exe 29 PID 2096 wrote to memory of 2740 2096 Au_.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\EBcdssvc.exeC:\Users\Admin\AppData\Local\Temp\EBcdssvc.exe -u3⤵PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
52KB
MD53d17a6e8d6e11feb3af9d05f5f198a54
SHA1f04819e1107659307af42a7a8de26212773d5386
SHA256add2f9fd39dbd2524494bcee7746cea84e45d600ea0c40b86bf2793718a73103
SHA51298fcac43cdb259e8afb061bc1d96f535c15aab61dd51cdcd12b90615e6210c5a2a8b49c1983da5ad80d74db31d3ff675fd977c17acfdb00221166e2763134338