Overview
overview
7Static
static
3725aaf787e...18.exe
windows7-x64
7725aaf787e...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
3$PLUGINSDI...er.exe
windows10-2004-x64
3$PLUGINSDI...ar.exe
windows7-x64
3$PLUGINSDI...ar.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...st.exe
windows7-x64
7$PLUGINSDI...st.exe
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3AdminWorker.exe
windows7-x64
3AdminWorker.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3WebInstaller.exe
windows7-x64
6WebInstaller.exe
windows10-2004-x64
6WebUpdater.exe
windows7-x64
3WebUpdater.exe
windows10-2004-x64
3content/iwa-ovr.js
windows7-x64
3content/iwa-ovr.js
windows10-2004-x64
3content/iwinarcade.js
windows7-x64
3content/iwinarcade.js
windows10-2004-x64
3firefox/iW...er.exe
windows7-x64
3firefox/iW...er.exe
windows10-2004-x64
3Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
725aaf787e45af3724762bafed23bd6d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
725aaf787e45af3724762bafed23bd6d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstGameInfoHelper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IwinToolbar.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IwinToolbar.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/iwintoolbarinst.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/iwintoolbarinst.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
AdminWorker.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
AdminWorker.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/GameuxInstallHelper.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
WebInstaller.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
WebInstaller.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
WebUpdater.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
WebUpdater.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
content/iwa-ovr.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
content/iwa-ovr.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
content/iwinarcade.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
content/iwinarcade.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
firefox/iWinArcadeLauncher.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
firefox/iWinArcadeLauncher.exe
Resource
win10v2004-20240704-en
General
-
Target
Uninstall.exe
-
Size
124KB
-
MD5
0f98374016e2f3a77034ecf068624e89
-
SHA1
6c363894525531dfd2135d648cbd18341c0e0c53
-
SHA256
3958f341474249b0fc1772c46bf4b2a8f6531bea26caceb44ec5c6c7aa1619cb
-
SHA512
2d6e5e928a23767203c86a01e9cc9bad99e430d57175a71b7743deccd2b665dfa5e88e7614825709b446b107edef74fdb2cc5fcb9377723799b3c0e125459756
-
SSDEEP
3072:yLk395hYXJTS4Z+H22Zip6dmDHgG2ojdotyeILc:yQqI4ITsp6dAT2ojdoIeILc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3504 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 3504 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 3504 Au_.exe 3504 Au_.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\iWinArcadeIECleanup = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iWinArcadeAutocleanup.bat" Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WebInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinTrusted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinGames.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral18/files/0x00080000000234c3-3.dat nsis_installer_1 behavioral18/files/0x00080000000234c3-3.dat nsis_installer_2 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Software\Microsoft\Windows\CurrentVersion\GameUX\GamesToFindOnWindowsUpgrade Au_.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Software Au_.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Software\Microsoft Au_.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Software\Microsoft\Windows Au_.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Software\Microsoft\Windows\CurrentVersion Au_.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Software\Microsoft\Windows\CurrentVersion\GameUX Au_.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1104 AdminWorker.exe 1104 AdminWorker.exe 1104 AdminWorker.exe 1104 AdminWorker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1104 AdminWorker.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3180 iWinGames.exe 2152 iWinGames.exe 1524 iWinGames.exe 3380 iWinGames.exe 2188 iWinGames.exe 4876 iWinGames.exe 3176 iWinGames.exe 1816 iWinGames.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3504 4868 Uninstall.exe 85 PID 4868 wrote to memory of 3504 4868 Uninstall.exe 85 PID 4868 wrote to memory of 3504 4868 Uninstall.exe 85 PID 3504 wrote to memory of 1464 3504 Au_.exe 92 PID 3504 wrote to memory of 1464 3504 Au_.exe 92 PID 3504 wrote to memory of 1464 3504 Au_.exe 92 PID 3504 wrote to memory of 1960 3504 Au_.exe 93 PID 3504 wrote to memory of 1960 3504 Au_.exe 93 PID 3504 wrote to memory of 1960 3504 Au_.exe 93 PID 3504 wrote to memory of 1932 3504 Au_.exe 94 PID 3504 wrote to memory of 1932 3504 Au_.exe 94 PID 3504 wrote to memory of 1932 3504 Au_.exe 94 PID 3504 wrote to memory of 4268 3504 Au_.exe 95 PID 3504 wrote to memory of 4268 3504 Au_.exe 95 PID 3504 wrote to memory of 4268 3504 Au_.exe 95 PID 4268 wrote to memory of 2292 4268 WebInstaller.exe 96 PID 4268 wrote to memory of 2292 4268 WebInstaller.exe 96 PID 4268 wrote to memory of 2292 4268 WebInstaller.exe 96 PID 3504 wrote to memory of 3180 3504 Au_.exe 97 PID 3504 wrote to memory of 3180 3504 Au_.exe 97 PID 3504 wrote to memory of 3180 3504 Au_.exe 97 PID 3504 wrote to memory of 1328 3504 Au_.exe 106 PID 3504 wrote to memory of 1328 3504 Au_.exe 106 PID 3504 wrote to memory of 1328 3504 Au_.exe 106 PID 3504 wrote to memory of 3752 3504 Au_.exe 107 PID 3504 wrote to memory of 3752 3504 Au_.exe 107 PID 3504 wrote to memory of 3752 3504 Au_.exe 107 PID 3504 wrote to memory of 2172 3504 Au_.exe 108 PID 3504 wrote to memory of 2172 3504 Au_.exe 108 PID 3504 wrote to memory of 2172 3504 Au_.exe 108 PID 3504 wrote to memory of 1104 3504 Au_.exe 109 PID 3504 wrote to memory of 1104 3504 Au_.exe 109 PID 3504 wrote to memory of 1104 3504 Au_.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" DelArcadeFromFireWallExceptions3⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" convertShortcutsToLinks3⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\iWinTrusted.exe"C:\Users\Admin\AppData\Local\Temp\iWinTrusted.exe" -remove3⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\WebInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WebInstaller.exe" -uninstall3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /u "C:\Users\Admin\AppData\Local\Temp\iWinGamesHookIE.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exe"C:\Users\Admin\AppData\Local\Temp\iWinGames.exe" /trackArcadeUninstall_reason_03⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" uninstallDesktopAlerts3⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "C:\Users\Admin\AppData\Local\Temp\iWinGamesHookIE.dll"3⤵
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u "C:\Users\Admin\AppData\Local\Temp\iWinInfo.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe"C:\Users\Admin\AppData\Local\Temp\AdminWorker.exe" KillProcess iWinGames.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2152
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3380
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4876
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3176
-
C:\Users\Admin\AppData\Local\Temp\iWinGames.exeC:\Users\Admin\AppData\Local\Temp\iWinGames.exe /trackArcadeUninstall_reason_01⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525B
MD53fab6cace3e92ea46392c914505e3099
SHA16dec01efb1bcb49f537c323f8fa522409dd8596c
SHA2565044b64eaf3b3b3f60cfae8b775b73f207de734a599891109ec5c5c91d830b8a
SHA5128dd789ff23c0d7501a618227360f3e3dd1ef17f4a6c2d46adb61c6fdb6c3116faea11d6acc5576464978b6cda7bc0e51f33999efe3494e4b829cab0c1749b52c
-
Filesize
94KB
MD54d3ac88054df63fc810427bdaa96c458
SHA1e4d554e03ba91f6b53a2a80253b339f56e303c94
SHA256b07ffcd0af80f6b9fba09abe816ba2f0ff0d336639f1768fc317291bc635ece6
SHA512d4732ad89bbb19b316dff1b9c534acf98bb985c89d1295f08e24b21531123426500b3712979dda2f0e941a5969c0cbca15bbd52f6c167653f96a494a6677ca54
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
124KB
MD50f98374016e2f3a77034ecf068624e89
SHA16c363894525531dfd2135d648cbd18341c0e0c53
SHA2563958f341474249b0fc1772c46bf4b2a8f6531bea26caceb44ec5c6c7aa1619cb
SHA5122d6e5e928a23767203c86a01e9cc9bad99e430d57175a71b7743deccd2b665dfa5e88e7614825709b446b107edef74fdb2cc5fcb9377723799b3c0e125459756