Overview
overview
7Static
static
383842aa82c...18.exe
windows7-x64
783842aa82c...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3EULA.rtf
windows7-x64
4EULA.rtf
windows10-2004-x64
1PizzaFrenzy.exe
windows7-x64
3PizzaFrenzy.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
83842aa82c64ef09d09bb8289446358c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83842aa82c64ef09d09bb8289446358c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
EULA.rtf
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
EULA.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
PizzaFrenzy.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
PizzaFrenzy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
aminstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
aminstall.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
83KB
-
MD5
d487c02662a348abe9bf91d6b1a30f35
-
SHA1
bac2e40ae1b356acba32c185aaf8431c220e28e1
-
SHA256
e3170a6c9290376a89dd59c96172a683e52993f58be5f7a090abe95836361498
-
SHA512
32193a799aabedac5b3d6978288309b892ed5697f0320139b9323e45c229aca99c582d42f9585acc05890292f833e2774f5f7c30896b77466d429adefd0f6906
-
SSDEEP
1536:lAuU2UTyxtFdkJvpcWbOV5nre5eVCe3p5DmNypHAs:lk5+bFdkJxcdSKCe7DD1As
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 A~NSISu_.exe -
Loads dropped DLL 5 IoCs
pid Process 2672 Uninstall.exe 2268 A~NSISu_.exe 2268 A~NSISu_.exe 2268 A~NSISu_.exe 2268 A~NSISu_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral19/files/0x000500000001a498-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 A~NSISu_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30 PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30 PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30 PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30 PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30 PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30 PID 2672 wrote to memory of 2268 2672 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD5e2b99378db2a47106b87f4140b80c188
SHA1d64b9bba0156ca31649c64b860d4aa2c1f2f39b6
SHA2569ab432a5e9666b4d4255f448a9ec27ca4affc0913f08acf29be7d93b69dfbc83
SHA51205a450bf5cbf1e7b7d34c8e4a6715285851079ba940b1f06e71b19e2492ddc0757720a91fdf0fb6cdcbad0121a16fbb64763308799e86dedb376fa79655fb4bf
-
Filesize
83KB
MD5d487c02662a348abe9bf91d6b1a30f35
SHA1bac2e40ae1b356acba32c185aaf8431c220e28e1
SHA256e3170a6c9290376a89dd59c96172a683e52993f58be5f7a090abe95836361498
SHA51232193a799aabedac5b3d6978288309b892ed5697f0320139b9323e45c229aca99c582d42f9585acc05890292f833e2774f5f7c30896b77466d429adefd0f6906
-
Filesize
12KB
MD557db62366ef11fdc47922a02031f0492
SHA16d30db5285b653025f94e74b9b045870dc0aeb7a
SHA2562338752092918db8e068d55bea61f8cdeb9be37b6e6d30a730d9703b169b08b4
SHA512d0257e02370863e07feb9346b88d87a102089f0c48aea13e069e55a14f0f6db51fb3d5f41ed5d2f39e36b612f4b6194a6b7c059709808bfb23ded89d0b0a3db5