Overview
overview
7Static
static
33a193e9a95...18.exe
windows7-x64
73a193e9a95...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/UNICCodec.exe
windows7-x64
7$TEMP/UNICCodec.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
3a193e9a95d4b6335a9e84c35ebaf1c8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a193e9a95d4b6335a9e84c35ebaf1c8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMP/UNICCodec.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$TEMP/UNICCodec.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
68cd276d5a6fefdef3f36abaec4e7ff7
-
SHA1
7cdcefd92dbedc6d858debc7b896ce052e62ddfd
-
SHA256
d40ad7ecbaaf5b6bc8428b69c0e43afa110806263db862adac2b25166c1a95cb
-
SHA512
647fc34083de5d2c8bb43114da402eda08167a19971437714b1774d7bd4bb37ca37640a251d5e12cbf0199d75508bf25092d9846a088128ac3c874cddea6c6df
-
SSDEEP
1536:DuLdaekIpG1GCDPy+EiaD4y3oAYp+d5qw6Re+u5+2n:bep8PHGDUw6ReV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2052 Uninstall.exe 1664 Au_.exe 1664 Au_.exe 1664 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral7/files/0x0007000000015d47-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1664 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28 PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28 PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28 PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28 PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28 PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28 PID 2052 wrote to memory of 1664 2052 Uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD568cd276d5a6fefdef3f36abaec4e7ff7
SHA17cdcefd92dbedc6d858debc7b896ce052e62ddfd
SHA256d40ad7ecbaaf5b6bc8428b69c0e43afa110806263db862adac2b25166c1a95cb
SHA512647fc34083de5d2c8bb43114da402eda08167a19971437714b1774d7bd4bb37ca37640a251d5e12cbf0199d75508bf25092d9846a088128ac3c874cddea6c6df