Overview
overview
7Static
static
331c1e94740...18.exe
windows7-x64
731c1e94740...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3Need3Space.exe
windows7-x64
3Need3Space.exe
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
31c1e94740b224ebcd6a3870e9ab29a6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
31c1e94740b224ebcd6a3870e9ab29a6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Need3Space.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Need3Space.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
General
-
Target
uninstall.exe
-
Size
60KB
-
MD5
eb7567dc1a4c537c125a1a669f896c2f
-
SHA1
0f76e368a708c5325c5747ac6b7f1a80ba2e49d6
-
SHA256
228342ced3ea271798c2ee8347d2fe1b469913fb9f92ddbff1beeed936d0d9ef
-
SHA512
c82361c2ff9e4b1c2bf546e74035fdaff756fcd59c197d188586689c6f012a0bd591f4d9800a8f03917e1c12ecabd5f33c8f382d75d3acb84a7291d11a8be4aa
-
SSDEEP
1536:2pgpHzb9dZVX9fHMvG0D3XJ3gdLeAyN/YO4kLV/S:cgXdZt9P6D3XJ3ceAi4kZ/S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1156 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 1460 uninstall.exe 1156 Au_.exe 1156 Au_.exe 1156 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral9/files/0x0005000000019368-2.dat nsis_installer_1 behavioral9/files/0x0005000000019368-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1156 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1156 1460 uninstall.exe 30 PID 1460 wrote to memory of 1156 1460 uninstall.exe 30 PID 1460 wrote to memory of 1156 1460 uninstall.exe 30 PID 1460 wrote to memory of 1156 1460 uninstall.exe 30 PID 1460 wrote to memory of 1156 1460 uninstall.exe 30 PID 1460 wrote to memory of 1156 1460 uninstall.exe 30 PID 1460 wrote to memory of 1156 1460 uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5eb7567dc1a4c537c125a1a669f896c2f
SHA10f76e368a708c5325c5747ac6b7f1a80ba2e49d6
SHA256228342ced3ea271798c2ee8347d2fe1b469913fb9f92ddbff1beeed936d0d9ef
SHA512c82361c2ff9e4b1c2bf546e74035fdaff756fcd59c197d188586689c6f012a0bd591f4d9800a8f03917e1c12ecabd5f33c8f382d75d3acb84a7291d11a8be4aa