Overview
overview
7Static
static
7a0d50f7754...18.exe
windows7-x64
7a0d50f7754...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows7-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/SetACL.exe
windows7-x64
3$TEMP/SetACL.exe
windows10-2004-x64
3MahjongGarden.exe
windows7-x64
3MahjongGarden.exe
windows10-2004-x64
3mjgardenres.dll
windows7-x64
3mjgardenres.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 02:13
Behavioral task
behavioral1
Sample
a0d50f775455808c982070e167034aa3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0d50f775455808c982070e167034aa3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/SetACL.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$TEMP/SetACL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
MahjongGarden.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
MahjongGarden.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
mjgardenres.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
mjgardenres.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
64KB
-
MD5
c1a66456705673f4cec01badab037ae2
-
SHA1
8179bb77af4b5b099d9bf2e5050d8625202e0437
-
SHA256
90eab61e5aa7b82404a6e2e13514b7e8efd6259db3635fbbc9b0c49911aec937
-
SHA512
0d6a6d9210f2f8d9ef688d53fed1d42b1c388a6c60dc9d9ff47006a16f5f0aa7838c4f0b1e070c3142aa11060896eb9911580011e0fed09b558f44bdbfec9f8b
-
SSDEEP
1536:CRhoEXBpnbfRpQmJjg0eVAW0Ubg3XTsJLYKF:CjJ7nbppQmJjpFR2g3XTsJsKF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1084 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1084 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 3004 uninst.exe 1084 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1084 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1084 3004 uninst.exe 30 PID 3004 wrote to memory of 1084 3004 uninst.exe 30 PID 3004 wrote to memory of 1084 3004 uninst.exe 30 PID 3004 wrote to memory of 1084 3004 uninst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
64KB
MD5c1a66456705673f4cec01badab037ae2
SHA18179bb77af4b5b099d9bf2e5050d8625202e0437
SHA25690eab61e5aa7b82404a6e2e13514b7e8efd6259db3635fbbc9b0c49911aec937
SHA5120d6a6d9210f2f8d9ef688d53fed1d42b1c388a6c60dc9d9ff47006a16f5f0aa7838c4f0b1e070c3142aa11060896eb9911580011e0fed09b558f44bdbfec9f8b