Overview
overview
7Static
static
3b77584a4ea...18.exe
windows7-x64
7b77584a4ea...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.exe
windows7-x64
3$PLUGINSDI...ll.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AutoShutdown.exe
windows7-x64
3AutoShutdown.exe
windows10-2004-x64
3ClonedFileCleaner.exe
windows7-x64
3ClonedFileCleaner.exe
windows10-2004-x64
3FilePulverizer.exe
windows7-x64
3FilePulverizer.exe
windows10-2004-x64
3StartupManager.exe
windows7-x64
3StartupManager.exe
windows10-2004-x64
3SweepHelper.exe
windows7-x64
3SweepHelper.exe
windows10-2004-x64
3SystemInformation.exe
windows7-x64
3SystemInformation.exe
windows10-2004-x64
3SystemSpee...er.exe
windows7-x64
3SystemSpee...er.exe
windows10-2004-x64
7res/info.html
windows7-x64
3res/info.html
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
136s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
b77584a4ea49bef141483fdc69fcb8e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b77584a4ea49bef141483fdc69fcb8e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckInstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CheckInstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
AutoShutdown.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
AutoShutdown.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ClonedFileCleaner.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
ClonedFileCleaner.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
FilePulverizer.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
FilePulverizer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
StartupManager.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
StartupManager.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
SweepHelper.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
SweepHelper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
SystemInformation.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
SystemInformation.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
SystemSpeedBooster.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
SystemSpeedBooster.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
res/info.html
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
res/info.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
65KB
-
MD5
4d1cd4f9b1bf87919490738c7310b706
-
SHA1
f5ef2062077ad83919a63f729dec670d5d6dc28c
-
SHA256
2be47d7a07c4504e4c9fe3e3e9fc1a13315b3f8def9a2539964c538c0bd055f6
-
SHA512
be54a1576abd4846ad2c3fb5576b36ad1303f25d7ce22d5b65c8df0c3700bda09b7b9ed60c7bd421090f4ea8ad40266ed2f49a10ae4e8af9fdbd3b85e0496ccb
-
SSDEEP
1536:VQpQ5EP0ijnRTXJzEBhHRIBuvzSTQDTSFg:VQIURTXJCQueJFg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4864 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral24/files/0x0007000000023515-4.dat nsis_installer_1 behavioral24/files/0x0007000000023515-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 4864 1688 uninst.exe 85 PID 1688 wrote to memory of 4864 1688 uninst.exe 85 PID 1688 wrote to memory of 4864 1688 uninst.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD54d1cd4f9b1bf87919490738c7310b706
SHA1f5ef2062077ad83919a63f729dec670d5d6dc28c
SHA2562be47d7a07c4504e4c9fe3e3e9fc1a13315b3f8def9a2539964c538c0bd055f6
SHA512be54a1576abd4846ad2c3fb5576b36ad1303f25d7ce22d5b65c8df0c3700bda09b7b9ed60c7bd421090f4ea8ad40266ed2f49a10ae4e8af9fdbd3b85e0496ccb