Overview
overview
7Static
static
3bedf467fbb...18.exe
windows7-x64
7bedf467fbb...18.exe
windows10-2004-x64
7$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDIR/Inetc.dll
windows7-x64
3$PLUGINSDIR/Inetc.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3X1000_uninst.exe
windows7-x64
7X1000_uninst.exe
windows10-2004-x64
7bin/appServer.exe
windows7-x64
1bin/appServer.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
bedf467fbba324cc03a1d9a236eacabc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bedf467fbba324cc03a1d9a236eacabc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
X1000_uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
X1000_uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
bin/appServer.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
bin/appServer.exe
Resource
win10v2004-20240802-en
General
-
Target
X1000_uninst.exe
-
Size
171KB
-
MD5
a133c8e70f0a3d71b5ecf14bd8ae8826
-
SHA1
2fa2ed11633733c1c177a0b16b054aa1df941e5c
-
SHA256
6a4baa98a11f85914a54703a79a94c719be3262f9ae64129cf08a5805623c77a
-
SHA512
843079ee7b11869319a689072101811dd53e53e430c89e8a9543b4023aaf3ef552201fea3c96f8c8527c6a7f388976380dbcc71e955a83c92a8164bb50ce061b
-
SSDEEP
3072:YgXdZt9P6D3XJZ/KIN4QBWaNYtGuJaodwnpBvsvdNpgEFJpmE4xDtaCq:Ye34v/KINFBJNYtGucoOLv8pgimE4vjq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2704 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 X1000_uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X1000_uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x0005000000019c5f-2.dat nsis_installer_1 behavioral11/files/0x0005000000019c5f-2.dat nsis_installer_2 -
Kills process with taskkill 4 IoCs
pid Process 2800 taskkill.exe 2696 taskkill.exe 2576 taskkill.exe 1908 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 2696 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2704 2368 X1000_uninst.exe 30 PID 2368 wrote to memory of 2704 2368 X1000_uninst.exe 30 PID 2368 wrote to memory of 2704 2368 X1000_uninst.exe 30 PID 2368 wrote to memory of 2704 2368 X1000_uninst.exe 30 PID 2704 wrote to memory of 2800 2704 Au_.exe 31 PID 2704 wrote to memory of 2800 2704 Au_.exe 31 PID 2704 wrote to memory of 2800 2704 Au_.exe 31 PID 2704 wrote to memory of 2800 2704 Au_.exe 31 PID 2704 wrote to memory of 2696 2704 Au_.exe 34 PID 2704 wrote to memory of 2696 2704 Au_.exe 34 PID 2704 wrote to memory of 2696 2704 Au_.exe 34 PID 2704 wrote to memory of 2696 2704 Au_.exe 34 PID 2704 wrote to memory of 2576 2704 Au_.exe 36 PID 2704 wrote to memory of 2576 2704 Au_.exe 36 PID 2704 wrote to memory of 2576 2704 Au_.exe 36 PID 2704 wrote to memory of 2576 2704 Au_.exe 36 PID 2704 wrote to memory of 1908 2704 Au_.exe 38 PID 2704 wrote to memory of 1908 2704 Au_.exe 38 PID 2704 wrote to memory of 1908 2704 Au_.exe 38 PID 2704 wrote to memory of 1908 2704 Au_.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\X1000_uninst.exe"C:\Users\Admin\AppData\Local\Temp\X1000_uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM AppGuard.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM ctrlservice.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM videoserver.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM httpd.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5a133c8e70f0a3d71b5ecf14bd8ae8826
SHA12fa2ed11633733c1c177a0b16b054aa1df941e5c
SHA2566a4baa98a11f85914a54703a79a94c719be3262f9ae64129cf08a5805623c77a
SHA512843079ee7b11869319a689072101811dd53e53e430c89e8a9543b4023aaf3ef552201fea3c96f8c8527c6a7f388976380dbcc71e955a83c92a8164bb50ce061b