Overview
overview
7Static
static
3151a9a7f07...18.exe
windows7-x64
7151a9a7f07...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3NP264PLAY.dll
windows7-x64
3NP264PLAY.dll
windows10-2004-x64
3NPDVRNET.dll
windows7-x64
1NPDVRNET.dll
windows10-2004-x64
1NPLANGUAGE.dll
windows7-x64
1NPLANGUAGE.dll
windows10-2004-x64
1npDvr.dll
windows7-x64
1npDvr.dll
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
129s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
151a9a7f07c64f2e476f3cd751093ebb_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
151a9a7f07c64f2e476f3cd751093ebb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
NP264PLAY.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
NP264PLAY.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
NPDVRNET.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
NPDVRNET.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
NPLANGUAGE.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
NPLANGUAGE.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
npDvr.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
npDvr.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
General
-
Target
uninst.exe
-
Size
56KB
-
MD5
6fd056c631d17162bcf60b139d02f029
-
SHA1
2f64bd3f622dd2bb132d2d84e74b491625422cdb
-
SHA256
bff24e298f16bcf2495735aea16bd0525908450ab97f4ef2cebf24234b8e4a9b
-
SHA512
1f0c63064c6ef6947bee456a9b5e85cf1dcef6559be1a7042a851af0b8acbde7a47bdc7ec1cc86d39e9c5ab4811bd820fcd067eb0475fb777ff93a1e47f1f0ab
-
SSDEEP
1536:T3cpyORJLuB4P4AJJ8bTiFqnD1QxNcmhh8:T3c1fP4AJJ8bTimuxNcm4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1880 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1880 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1880 Au_.exe 1880 Au_.exe 1880 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral16/files/0x0007000000023693-5.dat nsis_installer_1 behavioral16/files/0x0007000000023693-5.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1880 1884 uninst.exe 92 PID 1884 wrote to memory of 1880 1884 uninst.exe 92 PID 1884 wrote to memory of 1880 1884 uninst.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4720,i,1236064252342462940,13180713657498721890,262144 --variations-seed-version --mojo-platform-channel-handle=4256 /prefetch:81⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a401e590877ef6c928d2a97c66157094
SHA175e24799cf67e789fadcc8b7fddefc72fdc4cd61
SHA2562a7f33ef64d666a42827c4dc377806ad97bc233819197adf9696aed5be5efac0
SHA5126093415cd090e69cdcb52b5d381d0a8b3e9e5479dac96be641e0071f1add26403b27a453febd8ccfd16393dc1caa03404a369c768a580781aba3068415ee993f
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
56KB
MD56fd056c631d17162bcf60b139d02f029
SHA12f64bd3f622dd2bb132d2d84e74b491625422cdb
SHA256bff24e298f16bcf2495735aea16bd0525908450ab97f4ef2cebf24234b8e4a9b
SHA5121f0c63064c6ef6947bee456a9b5e85cf1dcef6559be1a7042a851af0b8acbde7a47bdc7ec1cc86d39e9c5ab4811bd820fcd067eb0475fb777ff93a1e47f1f0ab