Overview
overview
7Static
static
3d20f0b1250...18.exe
windows7-x64
7d20f0b1250...18.exe
windows10-2004-x64
7$1/QipInst...ff.exe
windows7-x64
1$1/QipInst...ff.exe
windows10-2004-x64
3$3/$APPDAT...er.exe
windows7-x64
7$3/$APPDAT...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$3/QIPApp.exe
windows7-x64
3$3/QIPApp.exe
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/Plugin...ng.dll
windows7-x64
3$R1/Plugin...ng.dll
windows10-2004-x64
3$R1/qip 8.0.exe
windows7-x64
3$R1/qip 8.0.exe
windows10-2004-x64
3$R1/unins000.exe
windows7-x64
7$R1/unins000.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
d20f0b12501f688ff63e7d06ae2d39cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d20f0b12501f688ff63e7d06ae2d39cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$1/QipInstallerStuff.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$1/QipInstallerStuff.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$3/$APPDATA/QIPApp/uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$3/$APPDATA/QIPApp/uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$3/QIPApp.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$3/QIPApp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$R1/Plugins/docking.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$R1/Plugins/docking.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$R1/qip 8.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$R1/qip 8.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$R1/unins000.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$R1/unins000.exe
Resource
win10v2004-20240802-en
General
-
Target
$R1/unins000.exe
-
Size
705KB
-
MD5
26ee6f06a21fbdf0de18cebd85853bbd
-
SHA1
e64a373a4c928e3f84174f9d75a286e038d259ff
-
SHA256
b916906a58e78b9b6c1a4672c12740549a81f57bc1b6bfe8ccef320013eaaa6e
-
SHA512
599ec361109b861d5cf8e87e20161d050e5a69c5e31bef2ed01d1a6ad441fd69eb21df8ee433a9e07889abe1ffdbb41a8f48182e0ea51c16711c91d679859522
-
SSDEEP
12288:MuA/arACiIrPe37lzH6A64EGYHuXsr5aER+gjrNAFR9FXsvy8duXEx9ZT:MN/arRiIrPe37lzH6A604cs1aEcdFXGJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation _iu14D2N.tmp -
Deletes itself 1 IoCs
pid Process 4720 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 4720 _iu14D2N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4720 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4720 3596 unins000.exe 85 PID 3596 wrote to memory of 4720 3596 unins000.exe 85 PID 3596 wrote to memory of 4720 3596 unins000.exe 85 PID 4720 wrote to memory of 1912 4720 _iu14D2N.tmp 93 PID 4720 wrote to memory of 1912 4720 _iu14D2N.tmp 93 PID 4720 wrote to memory of 1912 4720 _iu14D2N.tmp 93 PID 1912 wrote to memory of 1928 1912 cmd.exe 95 PID 1912 wrote to memory of 1928 1912 cmd.exe 95 PID 1912 wrote to memory of 1928 1912 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\$R1\unins000.exe"C:\Users\Admin\AppData\Local\Temp\$R1\unins000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\$R1\unins000.exe" /FIRSTPHASEWND=$A00662⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c regsvr32.exe /u /s "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\QStatSrv.dll"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u /s "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\QStatSrv.dll"4⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705KB
MD526ee6f06a21fbdf0de18cebd85853bbd
SHA1e64a373a4c928e3f84174f9d75a286e038d259ff
SHA256b916906a58e78b9b6c1a4672c12740549a81f57bc1b6bfe8ccef320013eaaa6e
SHA512599ec361109b861d5cf8e87e20161d050e5a69c5e31bef2ed01d1a6ad441fd69eb21df8ee433a9e07889abe1ffdbb41a8f48182e0ea51c16711c91d679859522