Overview
overview
7Static
static
38aaf4eba60...18.exe
windows7-x64
78aaf4eba60...18.exe
windows10-2004-x64
7$0.dll
windows7-x64
3$0.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PROGRAMFI...to.chm
windows7-x64
1$PROGRAMFI...to.chm
windows10-2004-x64
1$TEMP/4673...up.dll
windows7-x64
3$TEMP/4673...up.dll
windows10-2004-x64
3$TEMP/4673...le.exe
windows7-x64
1$TEMP/4673...le.exe
windows10-2004-x64
3$TEMP/Move...on.dll
windows7-x64
3$TEMP/Move...on.dll
windows10-2004-x64
3InstDrvAction-32.exe
windows7-x64
3InstDrvAction-32.exe
windows10-2004-x64
3UnloadModule.exe
windows7-x64
1UnloadModule.exe
windows10-2004-x64
3ePassNgMgr.exe
windows7-x64
3ePassNgMgr.exe
windows10-2004-x64
3ft12drv.dll
windows7-x64
4ft12drv.dll
windows10-2004-x64
4uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
8aaf4eba60924032f832fc6223780678_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8aaf4eba60924032f832fc6223780678_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/ngsrv/lang/howto.chm
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/ngsrv/lang/howto.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/NGSetup.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/NGSetup.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/UnloadModule.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$TEMP/4673551D-STFT12-4FE7-A218-48BDAE051E2B_std/UnloadModule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/MoveOldVersion.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$TEMP/MoveOldVersion.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
InstDrvAction-32.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
InstDrvAction-32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
UnloadModule.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
UnloadModule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
ePassNgMgr.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
ePassNgMgr.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ft12drv.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
ft12drv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
149KB
-
MD5
7d0e1740584afdb1e99e6c9c19995598
-
SHA1
a3386ecdc55b829486eb6dffb906a2717137dda1
-
SHA256
40ff460e185c76f5ed7a9110b740aa000092cc5776cc76d823eb443680da0b96
-
SHA512
51c2d281d258424485ce24293d5769828e486c7c566a42fd2934825c1a8035922ac15c7b95bc28ae46b32e362120b2422eaa72d68352108ddf502be046741177
-
SSDEEP
3072:tYg4pumJGq4JXCgFytYp81Vq9/945QW2ZZMHKmk45MBpKPWA:tlg4JXjytk146FQlkoG0PWA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3256 Au_.exe -
Loads dropped DLL 7 IoCs
pid Process 3256 Au_.exe 3256 Au_.exe 3256 Au_.exe 3256 Au_.exe 3256 Au_.exe 3256 Au_.exe 3256 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral28/files/0x00070000000234e1-4.dat nsis_installer_1 behavioral28/files/0x00070000000234e1-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3256 3248 uninst.exe 84 PID 3248 wrote to memory of 3256 3248 uninst.exe 84 PID 3248 wrote to memory of 3256 3248 uninst.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5eef9e469e8a30717974499f277d97e2a
SHA12d33c25984ebd9116beeb55cdde4c5c86c023e5d
SHA2561f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078
SHA512d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48
-
Filesize
11KB
MD5c6f5b9596db45ce43f14b64e0fbcf552
SHA1665a2207a643726602dc3e845e39435868dddabc
SHA2564b6da3f2bdb6c452fb493b98f6b7aa1171787dbd3fa2df2b3b22ccaeac88ffa0
SHA5128faa0204f9ed2721acede285be843b5a2d7f9986841bcf3816ebc8900910afb590816c64aebd2dd845686daf825bbf9970cb4a08b20a785c7e54542eddc5b09a
-
Filesize
4KB
MD566bb40a1defb0aef9865919689d4aa96
SHA190cc473004f4351f25d026d13b3f7cb19ee23908
SHA25682772146a77ac3bf5e3564361ca0de0b612a44482de4cf418c3deaa3b2ae7f1a
SHA5121f26650b7d0068b7e8ad1ac861e00bd184c8bf47363e4766b17a9aed5985f8a54efdde87b30cd9b649d6f5b8eb991ef9d06d4501eac264e1ff096506786133c2
-
Filesize
642B
MD5fc7ef3c22f6c6c0495b2574653a04551
SHA1e7b44cf3d4908ae6221db7a38b355732a7bb6f2b
SHA2568dd921585a3a8a17aaa2fa74ccad8f2bd68164647ff65b96813bde9389de9e8d
SHA5124c72ad9209033b4801b9efcc40b7cd682fe73381e42d48f688abd737d0311e3334b75760fce5bb31a42aee947712c0e67aa1f646893d5b44aa8a18a79fc3adc8
-
Filesize
681B
MD588471a16c77dad2001dad3bee50ab85f
SHA16366123aea8dad021c29cb6822b53b89ed4d4585
SHA2566cac2dffe526423bb8d7ca3b728c99cf3237139d61d36653114ff0b58ef61fc7
SHA5124a48f656f57e66fbc66b03405f36a4da46eaeddefb400d9e23950114ee72cbbcd305a280361be3781c3caace7cd8ed10802c5be1504fafdf6b2f9b164320a788
-
Filesize
668B
MD5cf8c80aa4d94e90639bbeef45126e876
SHA167abb15e830554b7d1c4a1406ade3af375950500
SHA256a5c0ed2e7be4ff2e361a4ff7b06c502cf02dc1d0381de817dcd8186b29cf10c9
SHA5121cc3a9fbba726ad426160d94fffb7e1e95e80dae9000f3671e125c61a0aa90e1107381a0b4e25668ec98c7a66f7daf5948e66355ea75be1c756f4fe8f28e5c28
-
Filesize
149KB
MD57d0e1740584afdb1e99e6c9c19995598
SHA1a3386ecdc55b829486eb6dffb906a2717137dda1
SHA25640ff460e185c76f5ed7a9110b740aa000092cc5776cc76d823eb443680da0b96
SHA51251c2d281d258424485ce24293d5769828e486c7c566a42fd2934825c1a8035922ac15c7b95bc28ae46b32e362120b2422eaa72d68352108ddf502be046741177