Overview
overview
7Static
static
36516412376...18.exe
windows7-x64
76516412376...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/11892.exe
windows7-x64
3$TEMP/11892.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
65164123762088cfd5bdf6e45de00604_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65164123762088cfd5bdf6e45de00604_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$TEMP/11892.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/11892.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
e3eb0e9417e3170ae5220cee53b02683
-
SHA1
c13f3c4182bcf58a12de3611b51b944693e8a691
-
SHA256
2c845c1539144bdaafd4029e20b4d4113fad4f7a875c62c681850cf5dd0c95c8
-
SHA512
0bf9d48c28715265dfaa0e42ad022dc344973f6fcf6cd58a6658a6cc12bc4ab535f2a87d253d74a5d3f8708a36f19e959498121f23da1799ef71ca1fbdac3923
-
SSDEEP
768:8/UpAHiGjRQ1kkjH918xnyzOp7OssT1pF/O71mJ/Xgd2iZQAm6kRRS+NoJRnE76c:gUeHiWRgkkjH8nyWmJfgdLeAyN/76c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral8/files/0x00070000000234b8-4.dat nsis_installer_1 behavioral8/files/0x00070000000234b8-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3340 wrote to memory of 2996 3340 Uninstall.exe 84 PID 3340 wrote to memory of 2996 3340 Uninstall.exe 84 PID 3340 wrote to memory of 2996 3340 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5e3eb0e9417e3170ae5220cee53b02683
SHA1c13f3c4182bcf58a12de3611b51b944693e8a691
SHA2562c845c1539144bdaafd4029e20b4d4113fad4f7a875c62c681850cf5dd0c95c8
SHA5120bf9d48c28715265dfaa0e42ad022dc344973f6fcf6cd58a6658a6cc12bc4ab535f2a87d253d74a5d3f8708a36f19e959498121f23da1799ef71ca1fbdac3923