Overview
overview
7Static
static
3a5357b0164...18.exe
windows7-x64
7a5357b0164...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Jigsaw.dll
windows7-x64
1Jigsaw.dll
windows10-2004-x64
1JigsawBeac...ay.exe
windows7-x64
3JigsawBeac...ay.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
a5357b01647400c898692509e56e70e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5357b01647400c898692509e56e70e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Jigsaw.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Jigsaw.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
JigsawBeachHoliday.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
JigsawBeachHoliday.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
aminstall.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
aminstall.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
89KB
-
MD5
9111cd15ae20e9466f9f849b7af57ca1
-
SHA1
416420588d49d2a12ad61b6bac94a22be1e1c7fb
-
SHA256
226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
-
SHA512
ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48
-
SSDEEP
1536:sUqBWUSFNrdN90DukJrXVXmXeUv+yLPrulXytFDOpFAM:PGW3B+DukJrF2OorLDulibE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 876 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 876 Au_.exe 876 Au_.exe 876 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral14/files/0x000800000002341f-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 876 1900 Uninstall.exe 85 PID 1900 wrote to memory of 876 1900 Uninstall.exe 85 PID 1900 wrote to memory of 876 1900 Uninstall.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD529459d9ee2bce32ed937fb1f965f9d5e
SHA18fff45ed45f3af8f8c248eba9a1c02c9c5fc911d
SHA256ad07968b7d93ef19e10e1deb52e0c912e96dde30c0a49a0239daf176fd4c9ef5
SHA512d4ef4eadb0f53e7086a1d242bf7f745ad79d83d9ecbfaa283cf0dd499271a804589a575040bb20d5c98e86197cc65ca05ab1a358c556ea82a3e297d0255015a6
-
Filesize
10KB
MD505e52213cfa17dee760186462a9645ed
SHA1f6d5e82080bbba65db7d54e89250c95af833aae3
SHA256d9d3ffa4c7d7a152f435f4777e72aa1b6a6c0555f277e59eedebc587c3b66ba5
SHA512586eea0bec6345b437667ce528bc2396427dd444a396456e38046a8962e92a52e7ee62b9f6c97f41bc1fb4a1b3905a302d6f7055e26b84e60709ba3b416ad172
-
Filesize
634B
MD56b5bfbd2fa736a8e09c989aaa8913d92
SHA1d9b3589bdcec78e74e4601341a368a6f04b73510
SHA25609e9cb84d9d783c299698e0bab57f62580678b5291da9c63888cdb01994421e2
SHA512a96ecc38a6e71fdea088cef82ad4b6f81085e0923c597ce8705f67fbcad4ff947e6b41c4e45c0d99bc292151c2c91896ea4d2d4fe389bd3bef9785877ddf9bb8
-
Filesize
89KB
MD59111cd15ae20e9466f9f849b7af57ca1
SHA1416420588d49d2a12ad61b6bac94a22be1e1c7fb
SHA256226324be5f0a18c000a6ee22f7083eb4997a10b5778e274fd86ed876e94ad8fd
SHA512ffc4bbe5be308fa36a33678616025a6af3d7ae4b15eaa6991d082ba8d89a1fb5c39bd961f776aff532f2aec88238b699eea20dfa1132a5ce80da32f3613f0b48