Overview
overview
7Static
static
3d16f1c4285...18.exe
windows7-x64
7d16f1c4285...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/PlayMYDVD.exe
windows7-x64
3$TEMP/PlayMYDVD.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16f1c428531f29b78f171ba28540ce5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/PlayMYDVD.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/PlayMYDVD.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
66KB
-
MD5
a9288e973ae497c007fbe2d38a0d7482
-
SHA1
2dde89cea40b642cac36663c4269dcca5b7bf66f
-
SHA256
4d79f805439bb0d4ac2c610d017703d52a186291df2a0c85461b0d23a311b29a
-
SHA512
37461c737225ee91fa9e7377ab1fa9f1bef20cf3eb7dd18b57db2b01ac0806cc89e1b92e68d9881455285a6933422fed21eaf040ff6491ff02aafa4b6f1c6154
-
SSDEEP
1536:97ANUHtHV6AWzwfFJUPfT4t3kUYp+djPw6RqRigBJbczgs:9TvfTzcTsw6R9gBbs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral8/files/0x0007000000023498-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1224 4948 Uninstall.exe 84 PID 4948 wrote to memory of 1224 4948 Uninstall.exe 84 PID 4948 wrote to memory of 1224 4948 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5a9288e973ae497c007fbe2d38a0d7482
SHA12dde89cea40b642cac36663c4269dcca5b7bf66f
SHA2564d79f805439bb0d4ac2c610d017703d52a186291df2a0c85461b0d23a311b29a
SHA51237461c737225ee91fa9e7377ab1fa9f1bef20cf3eb7dd18b57db2b01ac0806cc89e1b92e68d9881455285a6933422fed21eaf040ff6491ff02aafa4b6f1c6154