Overview
overview
7Static
static
3d04c9364de...18.exe
windows7-x64
7d04c9364de...18.exe
windows10-2004-x64
7$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...sc.dll
windows7-x64
3$PLUGINSDI...sc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
3WackyBirdHunter.exe
windows7-x64
3WackyBirdHunter.exe
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Readme.rtf
windows7-x64
4Readme.rtf
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
d04c9364de03fff6580f04865c7206f7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d04c9364de03fff6580f04865c7206f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
7za.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
WackyBirdHunter.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
WackyBirdHunter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
aminstall.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Readme.rtf
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Readme.rtf
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
87KB
-
MD5
8df58f296e0b1a3d0e69fd804ef44c81
-
SHA1
ee37897fb20df46e6a9aba42976edab2dcd1a6b3
-
SHA256
727efe8953380a29b8837878bcb6a6e18c9702810914032808bc1d59f65c090d
-
SHA512
0e65753417725a785c5d591fa4eec797f9ca6b1f55d0d8f9103ed4bdc5e33f0a34246cd025708f550f018958b0a40d70093b5b64aa566082b6e4ff624eab049e
-
SSDEEP
1536:Tspe3RDckBV0DdkJOHR83d0cpdXwyNLIAW35pSkeVS9XaxIdPa6:Ta1DdkJoR85pdXnLIA8p3eVS9XT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2540 Au_.exe -
Loads dropped DLL 6 IoCs
pid Process 2236 Uninstall.exe 2540 Au_.exe 2540 Au_.exe 2540 Au_.exe 2540 Au_.exe 2540 Au_.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral19/files/0x00050000000194b4-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30 PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30 PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30 PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30 PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30 PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30 PID 2236 wrote to memory of 2540 2236 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD5642f3ea0f2c827f3e36f284b15b36da1
SHA12d9ac8cab8d0f5d46bbc4652d39c78a4ddd4dde3
SHA25654c14d6164e85f422f51e26f470bfa7e9522456e6e44cab977be75449881ae93
SHA512a85bbb14e8cdd51703ff214738a5db8dc5197e87fa2c18d8503daffa71a43aa6a6bd09dc48d702c218b09230b74fa59678514b777306f780ce5fbd8fc7a39e3b
-
Filesize
12KB
MD53c19f79ce11facc2fc4d3351dbb263e0
SHA117f4bf4b18ea7700f70ac7d825dc997be0d25f71
SHA256cfaba712ad640ce2b4890005ffcf03ed9e2a18a6cf9075295f3aaea1478896b9
SHA51205c9ac861e4fed610171fcb5fad40abc30cbf90e9c7cb13c758f52cdff568af0fdd6af968db4fb143a748c77f21c353c7cffea28cbcbd2ad17157038ab490273
-
Filesize
10KB
MD5725145e8caa39635cab9899c47c72eda
SHA130478c907551bd920bf359638b091fc5c10b5a53
SHA2561759e4f7777fb8c9ed356a7d4dc237a90e0760061685d44ea02d40ca9e359ceb
SHA512de31286ea10321f762a3b6e7c6c82177d5b6f45a82adc936fcbbc23105708cbbbec903ba94ba94e7723e80f1828393e5395ef575b37136b19de7535e74e24547
-
Filesize
87KB
MD58df58f296e0b1a3d0e69fd804ef44c81
SHA1ee37897fb20df46e6a9aba42976edab2dcd1a6b3
SHA256727efe8953380a29b8837878bcb6a6e18c9702810914032808bc1d59f65c090d
SHA5120e65753417725a785c5d591fa4eec797f9ca6b1f55d0d8f9103ed4bdc5e33f0a34246cd025708f550f018958b0a40d70093b5b64aa566082b6e4ff624eab049e