Overview
overview
7Static
static
3d20f0b1250...18.exe
windows7-x64
7d20f0b1250...18.exe
windows10-2004-x64
7$1/QipInst...ff.exe
windows7-x64
1$1/QipInst...ff.exe
windows10-2004-x64
3$3/$APPDAT...er.exe
windows7-x64
7$3/$APPDAT...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$3/QIPApp.exe
windows7-x64
3$3/QIPApp.exe
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/Plugin...ng.dll
windows7-x64
3$R1/Plugin...ng.dll
windows10-2004-x64
3$R1/qip 8.0.exe
windows7-x64
3$R1/qip 8.0.exe
windows10-2004-x64
3$R1/unins000.exe
windows7-x64
7$R1/unins000.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
d20f0b12501f688ff63e7d06ae2d39cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d20f0b12501f688ff63e7d06ae2d39cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$1/QipInstallerStuff.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$1/QipInstallerStuff.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$3/$APPDATA/QIPApp/uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$3/$APPDATA/QIPApp/uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$3/QIPApp.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$3/QIPApp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$R1/Plugins/docking.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$R1/Plugins/docking.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$R1/qip 8.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$R1/qip 8.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$R1/unins000.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$R1/unins000.exe
Resource
win10v2004-20240802-en
General
-
Target
$R1/unins000.exe
-
Size
705KB
-
MD5
26ee6f06a21fbdf0de18cebd85853bbd
-
SHA1
e64a373a4c928e3f84174f9d75a286e038d259ff
-
SHA256
b916906a58e78b9b6c1a4672c12740549a81f57bc1b6bfe8ccef320013eaaa6e
-
SHA512
599ec361109b861d5cf8e87e20161d050e5a69c5e31bef2ed01d1a6ad441fd69eb21df8ee433a9e07889abe1ffdbb41a8f48182e0ea51c16711c91d679859522
-
SSDEEP
12288:MuA/arACiIrPe37lzH6A64EGYHuXsr5aER+gjrNAFR9FXsvy8duXEx9ZT:MN/arRiIrPe37lzH6A604cs1aEcdFXGJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1680 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 1680 _iu14D2N.tmp -
Loads dropped DLL 3 IoCs
pid Process 1956 unins000.exe 1680 _iu14D2N.tmp 1680 _iu14D2N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1956 wrote to memory of 1680 1956 unins000.exe 30 PID 1680 wrote to memory of 1048 1680 _iu14D2N.tmp 32 PID 1680 wrote to memory of 1048 1680 _iu14D2N.tmp 32 PID 1680 wrote to memory of 1048 1680 _iu14D2N.tmp 32 PID 1680 wrote to memory of 1048 1680 _iu14D2N.tmp 32 PID 1048 wrote to memory of 2232 1048 cmd.exe 34 PID 1048 wrote to memory of 2232 1048 cmd.exe 34 PID 1048 wrote to memory of 2232 1048 cmd.exe 34 PID 1048 wrote to memory of 2232 1048 cmd.exe 34 PID 1048 wrote to memory of 2232 1048 cmd.exe 34 PID 1048 wrote to memory of 2232 1048 cmd.exe 34 PID 1048 wrote to memory of 2232 1048 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\$R1\unins000.exe"C:\Users\Admin\AppData\Local\Temp\$R1\unins000.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\$R1\unins000.exe" /FIRSTPHASEWND=$6015A2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c regsvr32.exe /u /s "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\QStatSrv.dll"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\QStatSrv.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705KB
MD526ee6f06a21fbdf0de18cebd85853bbd
SHA1e64a373a4c928e3f84174f9d75a286e038d259ff
SHA256b916906a58e78b9b6c1a4672c12740549a81f57bc1b6bfe8ccef320013eaaa6e
SHA512599ec361109b861d5cf8e87e20161d050e5a69c5e31bef2ed01d1a6ad441fd69eb21df8ee433a9e07889abe1ffdbb41a8f48182e0ea51c16711c91d679859522
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3