Overview
overview
7Static
static
7746f12a372...18.exe
windows7-x64
7746f12a372...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDIR/nsis.exe
windows7-x64
7$PLUGINSDIR/nsis.exe
windows10-2004-x64
7GinoPlayer.exe
windows7-x64
6GinoPlayer.exe
windows10-2004-x64
6Interop.WMPLib.dll
windows7-x64
1Interop.WMPLib.dll
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3launcher.exe
windows7-x64
3launcher.exe
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 14:24
Behavioral task
behavioral1
Sample
746f12a372e559757e4f66535989e99e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
746f12a372e559757e4f66535989e99e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsis.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsis.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
GinoPlayer.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
GinoPlayer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Interop.WMPLib.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Interop.WMPLib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
launcher.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
launcher.exe
Resource
win10v2004-20240709-en
General
-
Target
Uninstall.exe
-
Size
77KB
-
MD5
ff11f586d42a888469164063c399d917
-
SHA1
b3feded2344ea9a22035f628a441883c6216bf3e
-
SHA256
869c31354b5c3f1c7586fec5c51270a606ca5210d4ea9df4a078a1d7bc62112e
-
SHA512
573c35c9f066a2fbfba29d1cee5157b0d518d62210beb088d8c5380d43da4ee749a215ff76531e9ff59161a6449bdb44e3e0ee2ec4b18e03e0d36cbb131cbc86
-
SSDEEP
1536:7iZU91Rzv4f/+LHgmpoM4sXJKTmdxQi5jaQkaB72/v97+N:7iezvrL9oMXJKatjIg639KN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1052 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2468 Uninstall.exe 1052 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x0005000000019624-2.dat nsis_installer_1 behavioral13/files/0x0005000000019624-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1052 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1052 2468 Uninstall.exe 31 PID 2468 wrote to memory of 1052 2468 Uninstall.exe 31 PID 2468 wrote to memory of 1052 2468 Uninstall.exe 31 PID 2468 wrote to memory of 1052 2468 Uninstall.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589B
MD5e1e594566f7c584a0e010a3ae80b4098
SHA11732634235a741d2f467130e8af9d1cb66111a62
SHA2567c6d4b8455e6d9113c09d70f506b4b01ab952432d22cc95ccf43bc766092204d
SHA5122e4765208348d626691637e687a1bf03dc670eccd3d86d333846194f9962fe03ddbc016ba60009417ec35ef8fe9c1add6f0aee324aa30ef97f185653079c6f15
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
77KB
MD5ff11f586d42a888469164063c399d917
SHA1b3feded2344ea9a22035f628a441883c6216bf3e
SHA256869c31354b5c3f1c7586fec5c51270a606ca5210d4ea9df4a078a1d7bc62112e
SHA512573c35c9f066a2fbfba29d1cee5157b0d518d62210beb088d8c5380d43da4ee749a215ff76531e9ff59161a6449bdb44e3e0ee2ec4b18e03e0d36cbb131cbc86