Overview
overview
7Static
static
3a5357b0164...18.exe
windows7-x64
7a5357b0164...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Jigsaw.dll
windows7-x64
1Jigsaw.dll
windows10-2004-x64
1JigsawBeac...ay.exe
windows7-x64
3JigsawBeac...ay.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
a5357b01647400c898692509e56e70e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5357b01647400c898692509e56e70e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Jigsaw.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Jigsaw.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
JigsawBeachHoliday.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
JigsawBeachHoliday.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
aminstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
aminstall.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
89KB
-
MD5
9111cd15ae20e9466f9f849b7af57ca1
-
SHA1
416420588d49d2a12ad61b6bac94a22be1e1c7fb
-
SHA256
226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
-
SHA512
ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48
-
SSDEEP
1536:sUqBWUSFNrdN90DukJrXVXmXeUv+yLPrulXytFDOpFAM:PGW3B+DukJrF2OorLDulibE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2088 Uninstall.exe 3008 Au_.exe 3008 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral13/files/0x000500000001a4d1-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3008 2088 Uninstall.exe 30 PID 2088 wrote to memory of 3008 2088 Uninstall.exe 30 PID 2088 wrote to memory of 3008 2088 Uninstall.exe 30 PID 2088 wrote to memory of 3008 2088 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD52f72f1847b836c4ecfa1a715a3a728b8
SHA1e50bffb4ff922fb0f5a7ec710141083e7411649c
SHA256c924f8fdde650abafed131662133b3fc4142ba0d9757bef992f0bb8b6867eedf
SHA51264f464ffa8e7eaa47706e5e62d1a152809ec3a70910c60fb2100de693ca7fb3d03533a22283f9aa8614e94cba2845c56ba37716cd795a1ad4e3dfb2b21474fcf
-
Filesize
608B
MD5249d4aa8a8c5f472a2fec2cb3ddef7e3
SHA199f395d9316fd7ff43d31a7026386910892c2556
SHA25602823473d969e5466a0aae096b14d9f866892817a81fab5b7bb6913fd67de843
SHA512026f6f1e81bf13bc720fa9ecd6b708932c9ad1cbbde91d048b926adfabb2d4a5b87367dfc9d27366799b83f12e49c0791342366f6d4f913d58144dd876cf2a74
-
Filesize
12KB
MD529459d9ee2bce32ed937fb1f965f9d5e
SHA18fff45ed45f3af8f8c248eba9a1c02c9c5fc911d
SHA256ad07968b7d93ef19e10e1deb52e0c912e96dde30c0a49a0239daf176fd4c9ef5
SHA512d4ef4eadb0f53e7086a1d242bf7f745ad79d83d9ecbfaa283cf0dd499271a804589a575040bb20d5c98e86197cc65ca05ab1a358c556ea82a3e297d0255015a6
-
Filesize
10KB
MD505e52213cfa17dee760186462a9645ed
SHA1f6d5e82080bbba65db7d54e89250c95af833aae3
SHA256d9d3ffa4c7d7a152f435f4777e72aa1b6a6c0555f277e59eedebc587c3b66ba5
SHA512586eea0bec6345b437667ce528bc2396427dd444a396456e38046a8962e92a52e7ee62b9f6c97f41bc1fb4a1b3905a302d6f7055e26b84e60709ba3b416ad172
-
Filesize
89KB
MD59111cd15ae20e9466f9f849b7af57ca1
SHA1416420588d49d2a12ad61b6bac94a22be1e1c7fb
SHA256226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
SHA512ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48