Overview
overview
7Static
static
3ab4ce4283b...18.exe
windows7-x64
7ab4ce4283b...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SpyFalcon.exe
windows7-x64
7SpyFalcon.exe
windows10-2004-x64
7msvcp71.dll
windows7-x64
3msvcp71.dll
windows10-2004-x64
3msvcr71.dll
windows7-x64
3msvcr71.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
ab4ce4283b57b4f2ef0ceb3d733af766_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab4ce4283b57b4f2ef0ceb3d733af766_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SpyFalcon.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
SpyFalcon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
msvcp71.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
msvcp71.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
msvcr71.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
msvcr71.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
40KB
-
MD5
ad651966f1792c370887a6fe5c10e730
-
SHA1
9cdc8e57675b97b29fbb1496dbc325ca10a17562
-
SHA256
039d7061fdae17ad7f6ec882b3b7831f8baba1a8f179f4e023922fa0f4758e1b
-
SHA512
a7064640f660249fe5fa50768cf9f11e8ceb8b3ac27b49d68dfcb15e2e2c296596aa3221af382dde88fc45efc8504ca7fe94ac5f9211cb1181eb1aec2fedc3a1
-
SSDEEP
768:LMEFP4CyxRyQR4Dk1b+/JwwXVPYwitff/ff6FS6sekJhCEy8HSVm8sXwBtr:FPJc2WCMNv0kJe8HSVm8Gur
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2172 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral16/files/0x00070000000234c0-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2172 1116 uninst.exe 84 PID 1116 wrote to memory of 2172 1116 uninst.exe 84 PID 1116 wrote to memory of 2172 1116 uninst.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5462dc0d8abebaa425c7808e696ad5a4d
SHA1db041b23fa77e1658d6c113fa73f4692a9168979
SHA256faf49e3e51562992570a1b468b18bd6c2c0f9fc2904e3136ca7aaf2a12ad9ac0
SHA512d1b77873251fa438f8fbebcd94820ba18c236d7f2ac4be85ae503fe6cac90544f889ef4facbca6f8b09c99c7f610a2d0a8aaa88505fce6df1f9b7d8b5eba3f83
-
Filesize
40KB
MD5ad651966f1792c370887a6fe5c10e730
SHA19cdc8e57675b97b29fbb1496dbc325ca10a17562
SHA256039d7061fdae17ad7f6ec882b3b7831f8baba1a8f179f4e023922fa0f4758e1b
SHA512a7064640f660249fe5fa50768cf9f11e8ceb8b3ac27b49d68dfcb15e2e2c296596aa3221af382dde88fc45efc8504ca7fe94ac5f9211cb1181eb1aec2fedc3a1