Overview
overview
7Static
static
30f7e24c662...18.exe
windows7-x64
70f7e24c662...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Chinese.dll
windows7-x64
3Chinese.dll
windows10-2004-x64
1VirtuQNES0.92.exe
windows7-x64
1VirtuQNES0.92.exe
windows10-2004-x64
1VirtuaNES 0.exe
windows7-x64
1VirtuaNES 0.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
0f7e24c662f0aef755b6cb576f6a7232_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f7e24c662f0aef755b6cb576f6a7232_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Chinese.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Chinese.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
VirtuQNES0.92.exe
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
VirtuQNES0.92.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
VirtuaNES 0.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
VirtuaNES 0.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
General
-
Target
uninst.exe
-
Size
67KB
-
MD5
1cb18abc45f390b074657349a12d3a54
-
SHA1
107fcb19fd84036b9ab6bf0ec77a13a20972648f
-
SHA256
9a5b9267e6b6623a1bc26d6b78955d7fa6b2f9d9070d37044072ab69bee08e52
-
SHA512
940dd3029a9df9a18f71fbed7f5538edeadc54d544981dd0f4bcecb49f4c8ba741b08f10b4ea93e309e166f28f7f0b11e4003e163afcd5efe32223ba1ed19a8e
-
SSDEEP
1536:WRhoEXBpnbfRpQmJm9oECy3lvUyS1vg3XTsJLYKR:WjJ7nbppQmJaoEx1vE1vg3XTsJsKR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1232 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1232 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1232 Au_.exe 1232 Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 1232 4208 uninst.exe 81 PID 4208 wrote to memory of 1232 4208 uninst.exe 81 PID 4208 wrote to memory of 1232 4208 uninst.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
67KB
MD51cb18abc45f390b074657349a12d3a54
SHA1107fcb19fd84036b9ab6bf0ec77a13a20972648f
SHA2569a5b9267e6b6623a1bc26d6b78955d7fa6b2f9d9070d37044072ab69bee08e52
SHA512940dd3029a9df9a18f71fbed7f5538edeadc54d544981dd0f4bcecb49f4c8ba741b08f10b4ea93e309e166f28f7f0b11e4003e163afcd5efe32223ba1ed19a8e