Overview
overview
7Static
static
369804b19b0...18.exe
windows7-x64
769804b19b0...18.exe
windows10-2004-x64
7$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...sc.dll
windows7-x64
3$PLUGINSDI...sc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
3WackyBirdHunter.exe
windows7-x64
3WackyBirdHunter.exe
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Readme.rtf
windows7-x64
4Readme.rtf
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
69804b19b05ebfd5e5f05ef9053d6415_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69804b19b05ebfd5e5f05ef9053d6415_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
7za.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
7za.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
WackyBirdHunter.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
WackyBirdHunter.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
aminstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
aminstall.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Readme.rtf
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Readme.rtf
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
87KB
-
MD5
495c607577b497723863687110dd0d8d
-
SHA1
5cbd8bfefafa0ab924d490458d45447706449261
-
SHA256
4c1b934d3c15b01d652f1ca09ac50208cbd87bd4b9191d555954820051425204
-
SHA512
72d42ce760e56fb520df19e8bad0ba1b975e192930f421b58abdbc66d19b3bf99fca431de0bed7dfe67134c6dd9bd75c35d510bc070cd3574215f7239cd6ce1c
-
SSDEEP
1536:lspe3RDckBV0DdkJOHR83d0cpdXwyNLIAW35pSkeVS9XaxIdPa6:la1DdkJoR85pdXnLIA8p3eVS9XT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 Au_.exe -
Loads dropped DLL 6 IoCs
pid Process 1312 Uninstall.exe 2696 Au_.exe 2696 Au_.exe 2696 Au_.exe 2696 Au_.exe 2696 Au_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral19/files/0x0005000000019bf2-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30 PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30 PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30 PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30 PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30 PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30 PID 1312 wrote to memory of 2696 1312 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD5b37662cfa1fc9ea8c90089f771fdd9f5
SHA153d6e14a0452de58dee82e5d67a1925e994fd4b9
SHA2569cca209605577fa4630e7ad1c9286722b10e55e7646dc6634b06011a8d908d98
SHA512ca5b0ad06c8dac43c5fac34fb66274e6d4826e99d038a31c94550b9fa7c71f56966a452144da98c58c9d07948201d48a19951e46c805a6e33bbe43440242e7a4
-
Filesize
12KB
MD53c19f79ce11facc2fc4d3351dbb263e0
SHA117f4bf4b18ea7700f70ac7d825dc997be0d25f71
SHA256cfaba712ad640ce2b4890005ffcf03ed9e2a18a6cf9075295f3aaea1478896b9
SHA51205c9ac861e4fed610171fcb5fad40abc30cbf90e9c7cb13c758f52cdff568af0fdd6af968db4fb143a748c77f21c353c7cffea28cbcbd2ad17157038ab490273
-
Filesize
10KB
MD5725145e8caa39635cab9899c47c72eda
SHA130478c907551bd920bf359638b091fc5c10b5a53
SHA2561759e4f7777fb8c9ed356a7d4dc237a90e0760061685d44ea02d40ca9e359ceb
SHA512de31286ea10321f762a3b6e7c6c82177d5b6f45a82adc936fcbbc23105708cbbbec903ba94ba94e7723e80f1828393e5395ef575b37136b19de7535e74e24547
-
Filesize
87KB
MD5495c607577b497723863687110dd0d8d
SHA15cbd8bfefafa0ab924d490458d45447706449261
SHA2564c1b934d3c15b01d652f1ca09ac50208cbd87bd4b9191d555954820051425204
SHA51272d42ce760e56fb520df19e8bad0ba1b975e192930f421b58abdbc66d19b3bf99fca431de0bed7dfe67134c6dd9bd75c35d510bc070cd3574215f7239cd6ce1c