Overview
overview
10Static
static
3e539f76d6c...18.exe
windows7-x64
3e539f76d6c...18.exe
windows10-2004-x64
3$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3avsuite.exe
windows7-x64
10avsuite.exe
windows10-2004-x64
3htmlayout.dll
windows7-x64
1htmlayout.dll
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3Analysis
-
max time kernel
112s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
e539f76d6cf5af0fc46788f3fd99094f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e539f76d6cf5af0fc46788f3fd99094f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
avsuite.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
avsuite.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
htmlayout.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
htmlayout.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20240802-en
General
-
Target
uninstall.exe
-
Size
41KB
-
MD5
61ac81123684bdecc0a022aa360f7ac1
-
SHA1
47ee464d9f40b4f3d4854f070273438347746db0
-
SHA256
fbf22d92b688320cbd2f0b2b8981edaaf1e828e1de48c31128d15e4847307277
-
SHA512
261ef9cf5f2727fa8003c19b70a29bc55b47ee2cb340c436b39970136de5cfdfd17b5100ab8ac806fe32181d940fb448a5d9378dbd6eb70a3425b2b176ef86f8
-
SSDEEP
768:6HJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJdJRnSlCjFZnOlb/:6pgpHzb9dZVX9fHMvG0D3XJYlCjW5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1480 uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x0004000000019308-2.dat nsis_installer_1 behavioral11/files/0x0004000000019308-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2904 1480 uninstall.exe 29 PID 1480 wrote to memory of 2904 1480 uninstall.exe 29 PID 1480 wrote to memory of 2904 1480 uninstall.exe 29 PID 1480 wrote to memory of 2904 1480 uninstall.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD561ac81123684bdecc0a022aa360f7ac1
SHA147ee464d9f40b4f3d4854f070273438347746db0
SHA256fbf22d92b688320cbd2f0b2b8981edaaf1e828e1de48c31128d15e4847307277
SHA512261ef9cf5f2727fa8003c19b70a29bc55b47ee2cb340c436b39970136de5cfdfd17b5100ab8ac806fe32181d940fb448a5d9378dbd6eb70a3425b2b176ef86f8