Overview
overview
7Static
static
5017c05a778...18.exe
windows7-x64
5017c05a778...18.exe
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3ecodec.exe
windows7-x64
7ecodec.exe
windows10-2004-x64
7uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 13:06
Behavioral task
behavioral1
Sample
017c05a778e1d4cac74f77901d432827_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
017c05a778e1d4cac74f77901d432827_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Loader.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Loader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ecodec.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ecodec.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
uninst.exe
Resource
win7-20240903-en
General
-
Target
uninst.exe
-
Size
25KB
-
MD5
a4e70a9dc4f4c6342bee1a37f6d572cc
-
SHA1
cda78cbc2ea9fdfc75ccb2d54c744afbc2085f7c
-
SHA256
b94f1ae51986f19541d74f3b82b642e913b1bbaa11c9c6792172bc25b44f43d3
-
SHA512
c45ff95096f7b78ae17dc3cc5ad801e5a687980fe6663cc9a17c4cf658e1e31e355d91a0782c134750db6ba6e78de224dbcb0fdae6b7335f9d306d28e7daa8b0
-
SSDEEP
384:AOlOQjVw9ka2Bt8TM6lK0KsGFqP3dx1/Vby7HvCQD3FS9ZVKl67vb4:AuOow9UBqw4k23DdITC41SJKU7vb4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2052 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 Au_.exe -
resource yara_rule behavioral10/memory/1828-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral10/files/0x00070000000234aa-4.dat upx behavioral10/memory/1828-7-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral10/memory/2052-10-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2052 1828 uninst.exe 82 PID 1828 wrote to memory of 2052 1828 uninst.exe 82 PID 1828 wrote to memory of 2052 1828 uninst.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5a4e70a9dc4f4c6342bee1a37f6d572cc
SHA1cda78cbc2ea9fdfc75ccb2d54c744afbc2085f7c
SHA256b94f1ae51986f19541d74f3b82b642e913b1bbaa11c9c6792172bc25b44f43d3
SHA512c45ff95096f7b78ae17dc3cc5ad801e5a687980fe6663cc9a17c4cf658e1e31e355d91a0782c134750db6ba6e78de224dbcb0fdae6b7335f9d306d28e7daa8b0