Overview
overview
7Static
static
372110cd3c5...18.exe
windows7-x64
772110cd3c5...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PROGRAMFI...ad.exe
windows7-x64
7$PROGRAMFI...ad.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/chrome.js
windows7-x64
3$TEMP/chrome.js
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
72110cd3c5f06311dbb61912604a993c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72110cd3c5f06311dbb61912604a993c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/linker.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/linker.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PROGRAMFILES/Toggle Downloader/Toggle Downloader RollerCoaster Tycoon/$PROGRAMFILES/Toggle Download.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$PROGRAMFILES/Toggle Downloader/Toggle Downloader RollerCoaster Tycoon/$PROGRAMFILES/Toggle Download.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$TEMP/chrome.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$TEMP/chrome.js
Resource
win10v2004-20240709-en
General
-
Target
$PROGRAMFILES/Toggle Downloader/Toggle Downloader RollerCoaster Tycoon/$PROGRAMFILES/Toggle Download.exe
-
Size
863KB
-
MD5
27ecbaf65445d559b5fe36fc9db2fb4f
-
SHA1
3a121e2f920406c91d5293e090ba63b49d81cf55
-
SHA256
eb213336162535fe63cd8870d11cf0341b6c9b365cc2e50e7267596e30c6e8c6
-
SHA512
1ac383eb6b77f489d329928388974cab5c5376860fcb48e6ed0a09d08e7cc2a2663b961e66165b397763a3127e67716a04bcb8bbd69e0318403b9caa2e098264
-
SSDEEP
12288:hCzd7N7otPKnsvAH6x0GbQP3XoIq5tLgVHkCAQlvtrN:hCzFvnsm6iGbQ/oIKikelvj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 348 Toggle Download.exe 2372 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Toggle Download.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral21/files/0x000600000001752e-2.dat nsis_installer_1 behavioral21/files/0x000600000001752e-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2372 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 2372 348 Toggle Download.exe 30 PID 348 wrote to memory of 2372 348 Toggle Download.exe 30 PID 348 wrote to memory of 2372 348 Toggle Download.exe 30 PID 348 wrote to memory of 2372 348 Toggle Download.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Toggle Downloader\Toggle Downloader RollerCoaster Tycoon\$PROGRAMFILES\Toggle Download.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Toggle Downloader\Toggle Downloader RollerCoaster Tycoon\$PROGRAMFILES\Toggle Download.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Toggle Downloader\Toggle Downloader RollerCoaster Tycoon\$PROGRAMFILES\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD5e1a94e65b90a760af34d277b996481ec
SHA17e569059a5f86436cb0fb97aba4289480321a18b
SHA256f5b5403b93aae860c422e2761932c37aaa097b3b43949cd4dcc30146ad3d599c
SHA5124496fba39ebc6429bfa399c66797e2f8dea91f86f66ab7e39942c8b578a09291e3db879cadc9de45b516046dfd2264c6a459bec61e2b6db66232155736bcc038
-
Filesize
623B
MD56083155c6a5422404a6f73b5486a1078
SHA10d03e999e76906130ded7721ba053b7abfb4f492
SHA25631674e9ec2199a5f6e70c0e7ab9a20fcedeb4bd01def1f920be8c050f468c43b
SHA512539b6b47dbc34b62f5be485053d15094fa16b1cc2832644da3d998979bbcd1c3a6b0f4d4752b3ad589bbd17319c34238d5fb112759f05d7ade6fc054d6d318d5
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
863KB
MD527ecbaf65445d559b5fe36fc9db2fb4f
SHA13a121e2f920406c91d5293e090ba63b49d81cf55
SHA256eb213336162535fe63cd8870d11cf0341b6c9b365cc2e50e7267596e30c6e8c6
SHA5121ac383eb6b77f489d329928388974cab5c5376860fcb48e6ed0a09d08e7cc2a2663b961e66165b397763a3127e67716a04bcb8bbd69e0318403b9caa2e098264