Overview
overview
7Static
static
32982870dd3...18.exe
windows7-x64
72982870dd3...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Jigsaw.dll
windows7-x64
1Jigsaw.dll
windows10-2004-x64
1JigsawBeac...ay.exe
windows7-x64
3JigsawBeac...ay.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3aminstall.dll
windows7-x64
1aminstall.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
2982870dd322d0469fa7e6f3b8bd7e99_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2982870dd322d0469fa7e6f3b8bd7e99_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Jigsaw.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Jigsaw.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
JigsawBeachHoliday.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
JigsawBeachHoliday.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
aminstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
aminstall.dll
Resource
win10v2004-20240704-en
General
-
Target
Uninstall.exe
-
Size
89KB
-
MD5
9111cd15ae20e9466f9f849b7af57ca1
-
SHA1
416420588d49d2a12ad61b6bac94a22be1e1c7fb
-
SHA256
226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
-
SHA512
ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48
-
SSDEEP
1536:sUqBWUSFNrdN90DukJrXVXmXeUv+yLPrulXytFDOpFAM:PGW3B+DukJrF2OorLDulibE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2888 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1796 Uninstall.exe 2888 Au_.exe 2888 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral13/files/0x003300000001470b-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2888 1796 Uninstall.exe 28 PID 1796 wrote to memory of 2888 1796 Uninstall.exe 28 PID 1796 wrote to memory of 2888 1796 Uninstall.exe 28 PID 1796 wrote to memory of 2888 1796 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD539b2233064ac65a150107a47d0a79052
SHA1329b73d80ade2f5fc69bb47867e40ac3cba099bc
SHA2562072e0969c7fe06ae500d67f2662392d1719ee66565d479f14f5517f38dd17c2
SHA51299c8c72d4329dac2c191704d80d46becf7f5bc6ba6c526844ea80d5dd0e1eebfb364fe322fa88cbec0f363554041500d5d091d608513c6eaeb287c5165e756f8
-
Filesize
634B
MD5839a985f35e27e5e058d8ab1f039a5b6
SHA19a83b17d6780021fa717a664996de09ea7bd160b
SHA256efc7105ba50f53c8812a94cbab47b1b71864466263f9e806a05abf496f80efe8
SHA51246f7aa97ae75c46318dc56d320f923e9d6b2d734b00264d5660dc138f99ea014ccb8162eb343ad03083914131d95b5c88d61a218af851ca54e58e3778ddb2d8e
-
Filesize
12KB
MD529459d9ee2bce32ed937fb1f965f9d5e
SHA18fff45ed45f3af8f8c248eba9a1c02c9c5fc911d
SHA256ad07968b7d93ef19e10e1deb52e0c912e96dde30c0a49a0239daf176fd4c9ef5
SHA512d4ef4eadb0f53e7086a1d242bf7f745ad79d83d9ecbfaa283cf0dd499271a804589a575040bb20d5c98e86197cc65ca05ab1a358c556ea82a3e297d0255015a6
-
Filesize
10KB
MD505e52213cfa17dee760186462a9645ed
SHA1f6d5e82080bbba65db7d54e89250c95af833aae3
SHA256d9d3ffa4c7d7a152f435f4777e72aa1b6a6c0555f277e59eedebc587c3b66ba5
SHA512586eea0bec6345b437667ce528bc2396427dd444a396456e38046a8962e92a52e7ee62b9f6c97f41bc1fb4a1b3905a302d6f7055e26b84e60709ba3b416ad172
-
Filesize
89KB
MD59111cd15ae20e9466f9f849b7af57ca1
SHA1416420588d49d2a12ad61b6bac94a22be1e1c7fb
SHA256226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
SHA512ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48