Analysis
-
max time kernel
141s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/HTxvid.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/HTxvid.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
61KB
-
MD5
a7a428973e50d27a7bfb804c7b89ef6f
-
SHA1
da5b2d816f1933467399cec0f63a4514cc172ce7
-
SHA256
77b112e73eacc1f20c6e010102496933b3b449f74ee8055a318ccb06b85b7fc3
-
SHA512
b4f24aed10c1bf2eb1acdba781f084ab783347d0611726f1a010ae9494b3d1d0810d350f7b801a7e660af2cf6a6253aaa93449b3a5e55addae3e7a50074cdc29
-
SSDEEP
1536:Wdb/vBxIdFlU0AfLhANuIj7Aw6RvEkLKN:WnilMfONuXw6R8jN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4116 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4116 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral6/files/0x0007000000023429-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 4116 744 Uninstall.exe 82 PID 744 wrote to memory of 4116 744 Uninstall.exe 82 PID 744 wrote to memory of 4116 744 Uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5a7a428973e50d27a7bfb804c7b89ef6f
SHA1da5b2d816f1933467399cec0f63a4514cc172ce7
SHA25677b112e73eacc1f20c6e010102496933b3b449f74ee8055a318ccb06b85b7fc3
SHA512b4f24aed10c1bf2eb1acdba781f084ab783347d0611726f1a010ae9494b3d1d0810d350f7b801a7e660af2cf6a6253aaa93449b3a5e55addae3e7a50074cdc29