Overview
overview
7Static
static
3a31156b8d8...18.exe
windows7-x64
7a31156b8d8...18.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LinkCreator.exe
windows7-x64
3LinkCreator.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3eMule Light.js
windows7-x64
3eMule Light.js
windows10-2004-x64
3eMule.js
windows7-x64
3eMule.js
windows10-2004-x64
3emule.exe
windows7-x64
3emule.exe
windows10-2004-x64
3lang/ar_AE.dll
windows7-x64
1lang/ar_AE.dll
windows10-2004-x64
1lang/ba_BA.dll
windows7-x64
1lang/ba_BA.dll
windows10-2004-x64
1lang/bg_BG.dll
windows7-x64
1lang/bg_BG.dll
windows10-2004-x64
1lang/ca_ES.dll
windows7-x64
1lang/ca_ES.dll
windows10-2004-x64
1lang/cz_CZ.dll
windows7-x64
1lang/cz_CZ.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
a31156b8d80a68e8f4354c63e0747beb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a31156b8d80a68e8f4354c63e0747beb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
LinkCreator.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
LinkCreator.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
eMule Light.js
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
eMule Light.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
eMule.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
eMule.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
emule.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
emule.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
lang/ar_AE.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
lang/ar_AE.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
lang/ba_BA.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
lang/ba_BA.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
lang/bg_BG.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
lang/bg_BG.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
lang/ca_ES.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
lang/ca_ES.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
lang/cz_CZ.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
lang/cz_CZ.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
79KB
-
MD5
a8e3e8c5ba3d8492edf5520eb24d64ba
-
SHA1
f0948f66fb8731d7ce3fc9fbf91eede9bc9df50b
-
SHA256
268bf5ffc58ec8a3671def0dfd886b4f22caab1313fc961583db77ad99c4b2d6
-
SHA512
2d8837b2a147f0f9860e3dccb1c2cd8d7911423b52e20b0140d0be00f3f61ddf7a16c680f7161fe29ccdfdaf8802ae69c2ad0facb5a5e4b8c4a36851fd55e698
-
SSDEEP
1536:RPx/CJAmx2/W5Ebnto4tmJ5gdLeAyN9OSyooRUQr+TSk34ae6S:Nx6UW6tpmJ5ceAFTrPae
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2060 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2632 Uninstall.exe 2060 Au_.exe 2060 Au_.exe 2060 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral13/files/0x000400000001d3b7-2.dat nsis_installer_1 behavioral13/files/0x000400000001d3b7-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2060 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31 PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31 PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31 PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31 PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31 PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31 PID 2632 wrote to memory of 2060 2632 Uninstall.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5a8e3e8c5ba3d8492edf5520eb24d64ba
SHA1f0948f66fb8731d7ce3fc9fbf91eede9bc9df50b
SHA256268bf5ffc58ec8a3671def0dfd886b4f22caab1313fc961583db77ad99c4b2d6
SHA5122d8837b2a147f0f9860e3dccb1c2cd8d7911423b52e20b0140d0be00f3f61ddf7a16c680f7161fe29ccdfdaf8802ae69c2ad0facb5a5e4b8c4a36851fd55e698