Overview
overview
7Static
static
366ee0b1785...18.exe
windows7-x64
766ee0b1785...18.exe
windows10-2004-x64
7$PLUGINSDI...ge.dll
windows7-x64
1$PLUGINSDI...ge.dll
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...sc.dll
windows7-x64
3$PLUGINSDI...sc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
1$PLUGINSDI...dt.dll
windows10-2004-x64
17za.exe
windows7-x64
17za.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
1$PLUGINSDI...dt.dll
windows10-2004-x64
1WackyBirdHunter.exe
windows7-x64
3WackyBirdHunter.exe
windows10-2004-x64
1aminstall.dll
windows7-x64
1aminstall.dll
windows10-2004-x64
3Readme.rtf
windows7-x64
4Readme.rtf
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
66ee0b1785556946e4bacea4b08898bd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66ee0b1785556946e4bacea4b08898bd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
7za.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
7za.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
WackyBirdHunter.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
WackyBirdHunter.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
aminstall.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
aminstall.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Readme.rtf
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Readme.rtf
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
87KB
-
MD5
3d10b54a208a315b9a80f6246bd75c11
-
SHA1
941aefa2771bb16561910e14d0ddf6c01bcc2c0d
-
SHA256
348d1f84aadb6a5b26ecd4d6eb3239be6ccec1f992d50ba84f53d019d4fa6143
-
SHA512
7aa944c6b49319479a90bd8a1ba1e8f1ee35a65ee839f9631f2ca352bf035a5ae64e780933c51f9f70cb956970a4ec906746a8305f8799681daaf62417f39d5c
-
SSDEEP
1536:/spe3RDckBV0DdkJOHR83d0cpdXwyNLIAW35pSkeVS9XaxIdPa6:/a1DdkJoR85pdXnLIA8p3eVS9XT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3592 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 3592 Au_.exe 3592 Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral20/files/0x0008000000023480-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3592 3792 Uninstall.exe 84 PID 3792 wrote to memory of 3592 3792 Uninstall.exe 84 PID 3792 wrote to memory of 3592 3792 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53c19f79ce11facc2fc4d3351dbb263e0
SHA117f4bf4b18ea7700f70ac7d825dc997be0d25f71
SHA256cfaba712ad640ce2b4890005ffcf03ed9e2a18a6cf9075295f3aaea1478896b9
SHA51205c9ac861e4fed610171fcb5fad40abc30cbf90e9c7cb13c758f52cdff568af0fdd6af968db4fb143a748c77f21c353c7cffea28cbcbd2ad17157038ab490273
-
Filesize
10KB
MD5725145e8caa39635cab9899c47c72eda
SHA130478c907551bd920bf359638b091fc5c10b5a53
SHA2561759e4f7777fb8c9ed356a7d4dc237a90e0760061685d44ea02d40ca9e359ceb
SHA512de31286ea10321f762a3b6e7c6c82177d5b6f45a82adc936fcbbc23105708cbbbec903ba94ba94e7723e80f1828393e5395ef575b37136b19de7535e74e24547
-
Filesize
610B
MD58e42f67cd0c421310997bcf244769d32
SHA1938d9bc1239f2e35a3adb574a3a82d3f2536490c
SHA2569fe466f1ef7b1e07af2ceaaa58533182f1e921d91f34d57db2aa0cd5f4fdb69e
SHA5129c5e400d2f3947d436e0694d82aa8a2976893f2ffe956027aa56bbcceddd59cb58dfdfedfbbde134f819d019d2a123256d20e8608026b9aef9df083c1294a4be
-
Filesize
87KB
MD53d10b54a208a315b9a80f6246bd75c11
SHA1941aefa2771bb16561910e14d0ddf6c01bcc2c0d
SHA256348d1f84aadb6a5b26ecd4d6eb3239be6ccec1f992d50ba84f53d019d4fa6143
SHA5127aa944c6b49319479a90bd8a1ba1e8f1ee35a65ee839f9631f2ca352bf035a5ae64e780933c51f9f70cb956970a4ec906746a8305f8799681daaf62417f39d5c