Overview
overview
7Static
static
3717b94fd2b...18.exe
windows7-x64
7717b94fd2b...18.exe
windows10-2004-x64
7$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...sc.dll
windows7-x64
3$PLUGINSDI...sc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
3WackyBirdHunter.exe
windows7-x64
3WackyBirdHunter.exe
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Readme.rtf
windows7-x64
4Readme.rtf
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
717b94fd2b18dcd501af61b008cb2940_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
717b94fd2b18dcd501af61b008cb2940_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
7za.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
7za.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
WackyBirdHunter.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
WackyBirdHunter.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
aminstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
aminstall.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Readme.rtf
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Readme.rtf
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
87KB
-
MD5
ef7a82bef192f8f54f697b75445b87d2
-
SHA1
6558607a2e92c6853467349bd267354aa304ff89
-
SHA256
9f500ef7aca53d6382bfb2ca454c94455aadac07d8e17fb7ba8737cc95c3b6ce
-
SHA512
62a86ae342d91d7d97d62b7f094d368ee40a5e1b290d559836bcdff7677aa6957cc58091c8e7b6522aa8881dec389c9eb28ea6ef54a2d42dd7f1ac97d79db5e2
-
SSDEEP
1536:wspe3RDckBV0DdkJOHR83d0cpdXwyNLIAW35pSkeVS9XaxIdPa6:wa1DdkJoR85pdXnLIA8p3eVS9XT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 Au_.exe -
Loads dropped DLL 6 IoCs
pid Process 2556 Uninstall.exe 2444 Au_.exe 2444 Au_.exe 2444 Au_.exe 2444 Au_.exe 2444 Au_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral19/files/0x0005000000019412-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2444 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30 PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30 PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30 PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30 PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30 PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30 PID 2556 wrote to memory of 2444 2556 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD59d981a3e1a5cb9696dcdbd1b1d220b20
SHA1b36b923a9e378e9df186449d63d8856595ff735c
SHA256edf8e2bfa631232c99e823c414c87b6d3c62f50dcd919a937251896a736b4dde
SHA51208fed7bc6b7ad92b626640226287c8a2ddac3e97f9eeaaff841810db85df3c4fe9e31393a24e924e015fe61071c5be4da6cfb22d3810800e8366934d3294abc9
-
Filesize
12KB
MD53c19f79ce11facc2fc4d3351dbb263e0
SHA117f4bf4b18ea7700f70ac7d825dc997be0d25f71
SHA256cfaba712ad640ce2b4890005ffcf03ed9e2a18a6cf9075295f3aaea1478896b9
SHA51205c9ac861e4fed610171fcb5fad40abc30cbf90e9c7cb13c758f52cdff568af0fdd6af968db4fb143a748c77f21c353c7cffea28cbcbd2ad17157038ab490273
-
Filesize
10KB
MD5725145e8caa39635cab9899c47c72eda
SHA130478c907551bd920bf359638b091fc5c10b5a53
SHA2561759e4f7777fb8c9ed356a7d4dc237a90e0760061685d44ea02d40ca9e359ceb
SHA512de31286ea10321f762a3b6e7c6c82177d5b6f45a82adc936fcbbc23105708cbbbec903ba94ba94e7723e80f1828393e5395ef575b37136b19de7535e74e24547
-
Filesize
87KB
MD5ef7a82bef192f8f54f697b75445b87d2
SHA16558607a2e92c6853467349bd267354aa304ff89
SHA2569f500ef7aca53d6382bfb2ca454c94455aadac07d8e17fb7ba8737cc95c3b6ce
SHA51262a86ae342d91d7d97d62b7f094d368ee40a5e1b290d559836bcdff7677aa6957cc58091c8e7b6522aa8881dec389c9eb28ea6ef54a2d42dd7f1ac97d79db5e2