Overview
overview
7Static
static
3fe1c426cb9...18.exe
windows7-x64
3fe1c426cb9...18.exe
windows10-2004-x64
7$SYSDIR/Em...er.scr
windows7-x64
3$SYSDIR/Em...er.scr
windows10-2004-x64
3$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
3tbu03852/options.html
windows10-2004-x64
3tbu03852/s...g.html
windows7-x64
3tbu03852/s...g.html
windows10-2004-x64
3tbu03852/s...b.html
windows7-x64
3tbu03852/s...b.html
windows10-2004-x64
3tbu03852/tbhelper.dll
windows7-x64
3tbu03852/tbhelper.dll
windows10-2004-x64
3tbu03852/t...091.js
windows7-x64
3tbu03852/t...091.js
windows10-2004-x64
3tbu03852/u...ll.exe
windows7-x64
3tbu03852/u...ll.exe
windows10-2004-x64
3tbu03852/update.exe
windows7-x64
3tbu03852/update.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe1c426cb92802fc1e6cd9dfd5ae182d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$SYSDIR/Eminem_Screensaver.scr
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$SYSDIR/Eminem_Screensaver.scr
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/dospop.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
tbu03852/dospop.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
tbu03852/options.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
tbu03852/options.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
tbu03852/static_img.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tbu03852/static_img.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tbu03852/static_pub.html
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
tbu03852/static_pub.html
Resource
win10v2004-20240910-en
Behavioral task
behavioral15
Sample
tbu03852/tbhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
tbu03852/uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
tbu03852/update.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
tbu03852/update.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
c6d317928b22189d530265651ca567a6
-
SHA1
18998323966353aa148d49dd733c4c79ff222e17
-
SHA256
ad57c2c999d318db908260079bd10e5cd9684fd5fb9b207d9bfe6bc5c93e377f
-
SHA512
25e393cca057491435e4b088be8d6b1031ab85aa3a310dad8af0a21b671f065cc850c9c74dbbac84a7fa39e82e5009e707cd521856036d969097eb46b8c94a0d
-
SSDEEP
1536:DRf1o2Ca7qiagSshdS0D6mJjgdLeAyNLXi:Dpj7EUbD6mJjceA4i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3192 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral24/files/0x00070000000234ca-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3192 3060 Uninstall.exe 83 PID 3060 wrote to memory of 3192 3060 Uninstall.exe 83 PID 3060 wrote to memory of 3192 3060 Uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5c6d317928b22189d530265651ca567a6
SHA118998323966353aa148d49dd733c4c79ff222e17
SHA256ad57c2c999d318db908260079bd10e5cd9684fd5fb9b207d9bfe6bc5c93e377f
SHA51225e393cca057491435e4b088be8d6b1031ab85aa3a310dad8af0a21b671f065cc850c9c74dbbac84a7fa39e82e5009e707cd521856036d969097eb46b8c94a0d