Overview
overview
7Static
static
7bca82a9a5c...18.exe
windows7-x64
7bca82a9a5c...18.exe
windows10-2004-x64
7$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 18:11
Behavioral task
behavioral1
Sample
bca82a9a5caccab4adffd9a7ec164840_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bca82a9a5caccab4adffd9a7ec164840_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcEx.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcEx.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsProcEx.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsProcEx.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
267KB
-
MD5
e2f13e8ef4393261accbf1820f494b22
-
SHA1
07ba5405f71ea82bcb8eb392172b2b8bc3a95e43
-
SHA256
2ad2574fb0e983dfbeff433b37d53098df32a3b8bc00a7fd81289343adea2deb
-
SHA512
62fb452417ef1f8103f7a958f9d5890024005eba3d45acbb1865388188452a34e69a30356040cc339ed110674bbe26d738959ae76e57b17196484bb08382b31b
-
SSDEEP
6144:2e34gc+JW5JiDhEruMYzwIn57i3VeH9MJscYxvODahLt2tyuuKeRsLAo:Fm5KOZYrUCySHLr6uHsLf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1512 Au_.exe -
Loads dropped DLL 7 IoCs
pid Process 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x0008000000023509-3.dat nsis_installer_1 behavioral12/files/0x0008000000023509-3.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe 1512 Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1512 2652 uninst.exe 87 PID 2652 wrote to memory of 1512 2652 uninst.exe 87 PID 2652 wrote to memory of 1512 2652 uninst.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
28KB
MD55e7c9a1b92ae6b794ac01929fcf6bf5b
SHA1cc7a45da00e97acdd5bdf013d460941c7a209031
SHA256778f0aaeaa4d4e11228257d18fa1145a16b7af6238f3268d41830edee38f2945
SHA512a6f492181d384ef3db29bf2f2db91ae2b87a64af7bdbdac8b5db72ffebe10b482775b3b09bb458e7005588e31488cdce4bd5d8c7d6b5f943c956bb9d702b13aa
-
Filesize
4KB
MD58f4ac52cb2f7143f29f114add12452ad
SHA129dc25f5d69bf129d608b83821c8ec8ab8c8edb3
SHA256b214d73aea95191f7363ad93cdc12b6fbd50a3a54b0aa891b3d45bc4b7b2aa04
SHA5122f9e2c7450557c2b88a12d3a3b4ab999c9f2a4df0d39dcd795b307b89855387bc96fc6d4fb51de8f33de0780e08a3b15fdad43daeaf7373cca71b01d7afdaf0c
-
Filesize
376KB
MD5c2c86a19ec4ac1195be3307f001897c2
SHA142f13dd9bdd0f3c60254c4c56af3288ebb4269c2
SHA256979f1d83c60e203281120fa9829c5b83ade7b0db35e141cee1e1b475fb421990
SHA512cd30d66e2ad3e09ed208eea0ef47a53ec835ee0ff0629c1d80e9a700c3d71d7ca4af0f5d8cc7046ec7519a983303a6b28cb031bb04932188a57e95bf2dc644bc
-
Filesize
267KB
MD5e2f13e8ef4393261accbf1820f494b22
SHA107ba5405f71ea82bcb8eb392172b2b8bc3a95e43
SHA2562ad2574fb0e983dfbeff433b37d53098df32a3b8bc00a7fd81289343adea2deb
SHA51262fb452417ef1f8103f7a958f9d5890024005eba3d45acbb1865388188452a34e69a30356040cc339ed110674bbe26d738959ae76e57b17196484bb08382b31b