Overview
overview
7Static
static
31809863772...18.exe
windows7-x64
71809863772...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/matrix33680.exe
windows7-x64
3$TEMP/matrix33680.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
18098637720bdce77eeb119276a3049d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18098637720bdce77eeb119276a3049d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$TEMP/matrix33680.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$TEMP/matrix33680.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
General
-
Target
Uninstall.exe
-
Size
52KB
-
MD5
fba2c31e49d2614b02e2155b404deb0f
-
SHA1
370a228e9fd25b096cb6e9e3f052363d543d2d2d
-
SHA256
6efba3a89f14a67de966f381626a21d92915706427aea6b35c29b30d3bf5de8b
-
SHA512
c916258a5157fd8ae4c104149bd62a83a0055a61e5fbd8bacaf116a6e30e2ea19589725612a951f22b4079d5349b4ba7dbaa4797e9e7043e97c18cd0d323536b
-
SSDEEP
768:7Sup23EQCjlQRB8/ewZ1iU6nyYFxbssT/F/O71mJ52qjWb1JW492XF7gJ1BV:Wu4EQalMK/ewGnh0mJ8BJWBXF7+V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 3048 Uninstall.exe 2680 Au_.exe 2680 Au_.exe 2680 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral7/files/0x0006000000015c91-2.dat nsis_installer_1 behavioral7/files/0x0006000000015c91-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28 PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28 PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28 PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28 PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28 PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28 PID 3048 wrote to memory of 2680 3048 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5fba2c31e49d2614b02e2155b404deb0f
SHA1370a228e9fd25b096cb6e9e3f052363d543d2d2d
SHA2566efba3a89f14a67de966f381626a21d92915706427aea6b35c29b30d3bf5de8b
SHA512c916258a5157fd8ae4c104149bd62a83a0055a61e5fbd8bacaf116a6e30e2ea19589725612a951f22b4079d5349b4ba7dbaa4797e9e7043e97c18cd0d323536b