Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
18b950b01ff5f7778c0d090267427efc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18b950b01ff5f7778c0d090267427efc_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$SYSDIR/Demi_Moore_Screensaver.scr
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$SYSDIR/Demi_Moore_Screensaver.scr
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240611-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
aea6c63737602f35bc15439be08fda1b
-
SHA1
766def630e9dc5539f08aa5c2ae49a9941badec6
-
SHA256
daa92bd80117f404e16cc6f834a6289b96c39c630626bb3f03d27cfda956c202
-
SHA512
0c04894313f0da3e1db01cd1112511dd5083a92e5e3963a27e4e440b408e1c8de8758af70d5ed898871330eccf96688a1183d7e8c8f5e7f3a7e5877c630f9bb9
-
SSDEEP
768:eH4TpUwV2lsQh+6dGITt/MGKLN/QPsuWy0D3cFBOV1mJrgd2iZQAm6kRRS+NoJR/:eYTmwVUsW7dtJMHy0DxmJrgdLeAyNLaz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3956 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral6/files/0x0008000000023426-3.dat nsis_installer_1 behavioral6/files/0x0008000000023426-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 3956 448 Uninstall.exe 83 PID 448 wrote to memory of 3956 448 Uninstall.exe 83 PID 448 wrote to memory of 3956 448 Uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5aea6c63737602f35bc15439be08fda1b
SHA1766def630e9dc5539f08aa5c2ae49a9941badec6
SHA256daa92bd80117f404e16cc6f834a6289b96c39c630626bb3f03d27cfda956c202
SHA5120c04894313f0da3e1db01cd1112511dd5083a92e5e3963a27e4e440b408e1c8de8758af70d5ed898871330eccf96688a1183d7e8c8f5e7f3a7e5877c630f9bb9