Overview
overview
7Static
static
3fa0ccd0a4e...18.exe
windows7-x64
7fa0ccd0a4e...18.exe
windows10-2004-x64
7$PLUGINSDI...ig.dll
windows7-x64
3$PLUGINSDI...ig.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...tc.dll
windows7-x64
3$PLUGINSDI...tc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
fa0ccd0a4ef9885f1efd7c0048ebfbb2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa0ccd0a4ef9885f1efd7c0048ebfbb2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ginetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ginetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
58KB
-
MD5
4b7a489d94c2ba1b40fdee0c297afea8
-
SHA1
5fc488b11208b01d64d66b790bfaf43af801d4e7
-
SHA256
a23fd690257aa30d7902ba15e1d4bd5df0492263c5add6e6af398b901d1d6d4c
-
SHA512
be288b81a100b76b241266a3950a97a6485b8768902c3beef5c08dbd70a6a0c0faf049e06a42e76337729efef78dc19dc39dd20d302b7bdb04546109d03b64e2
-
SSDEEP
1536:+pgpHzb9dZVX9fHMvG0D3XJNfYRN6QcIeVhVkCo:EgXdZt9P6D3XJNqCVhVkCo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x00070000000191ad-2.dat nsis_installer_1 behavioral11/files/0x00070000000191ad-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2768 2668 uninst.exe 30 PID 2668 wrote to memory of 2768 2668 uninst.exe 30 PID 2668 wrote to memory of 2768 2668 uninst.exe 30 PID 2668 wrote to memory of 2768 2668 uninst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD54b7a489d94c2ba1b40fdee0c297afea8
SHA15fc488b11208b01d64d66b790bfaf43af801d4e7
SHA256a23fd690257aa30d7902ba15e1d4bd5df0492263c5add6e6af398b901d1d6d4c
SHA512be288b81a100b76b241266a3950a97a6485b8768902c3beef5c08dbd70a6a0c0faf049e06a42e76337729efef78dc19dc39dd20d302b7bdb04546109d03b64e2