Overview
overview
7Static
static
322f5372663...18.exe
windows7-x64
722f5372663...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PROGRAMFI...To.exe
windows7-x64
7$PROGRAMFI...To.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/chrome.js
windows7-x64
3$TEMP/chrome.js
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
22f537266337fbc7c8e05912d40941e3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22f537266337fbc7c8e05912d40941e3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/linker.dll
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/linker.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PROGRAMFILES/Toggle Downloader/Toggle Downloader Nero StartSmart/$PROGRAMFILES/Toggle Downloader/To.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
$PROGRAMFILES/Toggle Downloader/Toggle Downloader Nero StartSmart/$PROGRAMFILES/Toggle Downloader/To.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
$TEMP/chrome.js
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
$TEMP/chrome.js
Resource
win10v2004-20240508-en
General
-
Target
$PROGRAMFILES/Toggle Downloader/Toggle Downloader Nero StartSmart/$PROGRAMFILES/Toggle Downloader/To.exe
-
Size
863KB
-
MD5
27ecbaf65445d559b5fe36fc9db2fb4f
-
SHA1
3a121e2f920406c91d5293e090ba63b49d81cf55
-
SHA256
eb213336162535fe63cd8870d11cf0341b6c9b365cc2e50e7267596e30c6e8c6
-
SHA512
1ac383eb6b77f489d329928388974cab5c5376860fcb48e6ed0a09d08e7cc2a2663b961e66165b397763a3127e67716a04bcb8bbd69e0318403b9caa2e098264
-
SSDEEP
12288:hCzd7N7otPKnsvAH6x0GbQP3XoIq5tLgVHkCAQlvtrN:hCzFvnsm6iGbQ/oIKikelvj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2452 To.exe 2608 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral21/files/0x0039000000013362-5.dat nsis_installer_1 behavioral21/files/0x0039000000013362-5.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2608 2452 To.exe 28 PID 2452 wrote to memory of 2608 2452 To.exe 28 PID 2452 wrote to memory of 2608 2452 To.exe 28 PID 2452 wrote to memory of 2608 2452 To.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Toggle Downloader\Toggle Downloader Nero StartSmart\$PROGRAMFILES\Toggle Downloader\To.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Toggle Downloader\Toggle Downloader Nero StartSmart\$PROGRAMFILES\Toggle Downloader\To.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Toggle Downloader\Toggle Downloader Nero StartSmart\$PROGRAMFILES\Toggle Downloader\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
609B
MD5478ba23a4ccb9a31901fa2ebfb4096d2
SHA139327b19ca123efec816ef76c1e5f7df5f80bf3a
SHA2562b0f36d8daefc352d03ee2fc893f93bf08c51ec6c96e8b3547a69bde16829162
SHA5129bc8eb9a96401c3a7e6268b7f578450c17c053d08c6eca19ce8362b1763944338f6ea065fe1cec2928a549b7a2256f084ccf88ffdcfcea35ff5a5cd9b5021005
-
Filesize
648B
MD5718427cddac02c847d43897f804e3943
SHA1826064bc76c7e2c9e8fa3e8544c947e79b5e4ef1
SHA256d861915920a7e58f567b34ff4d7ea775f240f17b250e6e8e2a4453128be4507c
SHA5128076753f306137d8b6f0c59416badbcf410d67da74f670955b8d58d06958677cd24d455f094f6ffd8fe90408468f0beb0546ef55d438de526c1395ddcb5c55d7
-
Filesize
863KB
MD527ecbaf65445d559b5fe36fc9db2fb4f
SHA13a121e2f920406c91d5293e090ba63b49d81cf55
SHA256eb213336162535fe63cd8870d11cf0341b6c9b365cc2e50e7267596e30c6e8c6
SHA5121ac383eb6b77f489d329928388974cab5c5376860fcb48e6ed0a09d08e7cc2a2663b961e66165b397763a3127e67716a04bcb8bbd69e0318403b9caa2e098264
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf