Overview
overview
7Static
static
32e6d7f6edd...18.exe
windows7-x64
72e6d7f6edd...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/vidxcore.dll
windows7-x64
1$TEMP/vidxcore.dll
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2e6d7f6edddd23b9cbcb658c0858423b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e6d7f6edddd23b9cbcb658c0858423b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$TEMP/vidxcore.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$TEMP/vidxcore.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240704-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
5bfaaf0f67c1e620e6cb41fa9c72e6be
-
SHA1
33bb6199bc40db42f961ffbd1fcbf1ebb8082c9f
-
SHA256
a64a14895601ec3ea0f8f67db828e0f08ab9614ae4bd03a9b017f9f87eca6d4a
-
SHA512
817f2538949e2bef3bcd728e3c409d026f27b970da2c1e3be00209032ce38bce8cf2c1add549d6a1a732a0f67e46facec8eaf656a025820d6528ecf265b91e1f
-
SSDEEP
768:8/UpAHiGjRQ1kkjH918xnyzOp7OssT1pF/O71mJ/Xgd2iZQAm6kRRS+NoJRnEp4c:gUeHiWRgkkjH8nyWmJfgdLeAyN/p4JWV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5100 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral10/files/0x000700000002343e-4.dat nsis_installer_1 behavioral10/files/0x000700000002343e-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 5100 872 Uninstall.exe 83 PID 872 wrote to memory of 5100 872 Uninstall.exe 83 PID 872 wrote to memory of 5100 872 Uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:5100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD55bfaaf0f67c1e620e6cb41fa9c72e6be
SHA133bb6199bc40db42f961ffbd1fcbf1ebb8082c9f
SHA256a64a14895601ec3ea0f8f67db828e0f08ab9614ae4bd03a9b017f9f87eca6d4a
SHA512817f2538949e2bef3bcd728e3c409d026f27b970da2c1e3be00209032ce38bce8cf2c1add549d6a1a732a0f67e46facec8eaf656a025820d6528ecf265b91e1f