Overview
overview
7Static
static
39ff1303551...18.exe
windows7-x64
79ff1303551...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/MSVCP60.dll
windows7-x64
3$SYSDIR/MSVCP60.dll
windows10-2004-x64
3$SYSDIR/MSVCRT.dll
windows7-x64
3$SYSDIR/MSVCRT.dll
windows10-2004-x64
3$SYSDIR/Mfc42Loc.dll
windows7-x64
1$SYSDIR/Mfc42Loc.dll
windows10-2004-x64
1$SYSDIR/Nsdgs32.dll
windows7-x64
3$SYSDIR/Nsdgs32.dll
windows10-2004-x64
3$SYSDIR/OCIW32.dll
windows7-x64
3$SYSDIR/OCIW32.dll
windows10-2004-x64
3$SYSDIR/de...al.exe
windows7-x64
7$SYSDIR/de...al.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/mfc42.dll
windows7-x64
3$SYSDIR/mfc42.dll
windows10-2004-x64
3$SYSDIR/zlib.dll
windows7-x64
3$SYSDIR/zlib.dll
windows10-2004-x64
3$_2_/1.htm
windows7-x64
3$_2_/1.htm
windows10-2004-x64
3$_2_/10.htm
windows7-x64
3$_2_/10.htm
windows10-2004-x64
3$_2_/100.htm
windows7-x64
3$_2_/100.htm
windows10-2004-x64
3$_2_/101.htm
windows7-x64
3$_2_/101.htm
windows10-2004-x64
3$_2_/102.htm
windows7-x64
3$_2_/102.htm
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
9ff13035510edafddf1fb04f55b48184_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9ff13035510edafddf1fb04f55b48184_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$SYSDIR/MSVCP60.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$SYSDIR/MSVCP60.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$SYSDIR/MSVCRT.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$SYSDIR/MSVCRT.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$SYSDIR/Mfc42Loc.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$SYSDIR/Mfc42Loc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$SYSDIR/Nsdgs32.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$SYSDIR/Nsdgs32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$SYSDIR/OCIW32.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$SYSDIR/OCIW32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$SYSDIR/desinst_rural.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$SYSDIR/desinst_rural.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$SYSDIR/mfc42.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$SYSDIR/mfc42.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$SYSDIR/zlib.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$SYSDIR/zlib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$_2_/1.htm
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$_2_/1.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$_2_/10.htm
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
$_2_/10.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$_2_/100.htm
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
$_2_/100.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$_2_/101.htm
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
$_2_/101.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$_2_/102.htm
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$_2_/102.htm
Resource
win10v2004-20240802-en
General
-
Target
$SYSDIR/desinst_rural.exe
-
Size
76KB
-
MD5
def2c0a4792cc5ef0215950fc1643c56
-
SHA1
994bf0c93774cdad39f0ba1c6f917fd5ac01f6a5
-
SHA256
dc2898bbc1836e658163e1fc5eb937a7f3234e68cf7fe84dd03e3d418c5adc8f
-
SHA512
545356418d3e1fc04edf189420575aa205b78ae0986652d2d981e8511e497f1e45159a446d6075a0b80de489e2e04ea7e65a5195dd4d3da1546f0152902bab43
-
SSDEEP
1536:tUqBWUSFNrdN90DukJbu6RmpcMUHgSo0M++tQmT/xTH2xt7:yGW3B+DukJbuJhUA3t1DxTH8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid process 2392 Au_.exe -
Loads dropped DLL 5 IoCs
Processes:
desinst_rural.exeAu_.exepid process 1028 desinst_rural.exe 2392 Au_.exe 2392 Au_.exe 2392 Au_.exe 2392 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
desinst_rural.exeAu_.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language desinst_rural.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Au_.exepid process 2392 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
desinst_rural.exedescription pid process target process PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe PID 1028 wrote to memory of 2392 1028 desinst_rural.exe Au_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$SYSDIR\desinst_rural.exe"C:\Users\Admin\AppData\Local\Temp\$SYSDIR\desinst_rural.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$SYSDIR\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685B
MD580f744dbd707211d092aea690994fd7f
SHA1f1791a903fbc8cf6c03e31c3a47937133d3d19c8
SHA256b6c42948487f435dd0d76c4253b4f65bb3c7237a67f9bf5535c96c8d73779c03
SHA512439155f73ebca73182fe14ecf7323de435d1ab0295802c98422ee028be9b04b68e186ac7ad7db6b1f780f97fd6528599f14acef05d20143f3e92736e6f17691f
-
Filesize
724B
MD509abcb93d3a7673517a32733cb56fbbf
SHA121447e798b5bf5f18ef862b7c961c79aeaaedf8a
SHA256078585a0ac49204cb44ba316fe54187b17ed7fe7f16f24bb9773a9c60ebf4f2b
SHA512ba20553c7f887996964909dbf1e7c314fdad2fbab459f951357c2da6902c6ee1f4ac7c6ee1e5aadb86b4d1046bed4e00cf87ff3b00d58b8b0f9c4dc7a180a4e6
-
Filesize
12KB
MD5b3ebe1cb6bdd529302c121dd4e2e0d00
SHA1305f022e7e3ef0ae6cdc5f18bd6adc3032f64304
SHA2565a1696f9892567b3339faf2bf4df5eb1d2d886c49807529028b65f0f493e79b2
SHA5126f6ea4aec1588bb6f7ab4f8422942ac0acbddb8b916af2ead039b434bec6db4d0bf64deb3b8d6cc33666cabd70024a1208411ab6e0ee10bcf98c47951f8d359a
-
Filesize
76KB
MD5def2c0a4792cc5ef0215950fc1643c56
SHA1994bf0c93774cdad39f0ba1c6f917fd5ac01f6a5
SHA256dc2898bbc1836e658163e1fc5eb937a7f3234e68cf7fe84dd03e3d418c5adc8f
SHA512545356418d3e1fc04edf189420575aa205b78ae0986652d2d981e8511e497f1e45159a446d6075a0b80de489e2e04ea7e65a5195dd4d3da1546f0152902bab43