Overview
overview
7Static
static
706dfdbac6e...18.exe
windows7-x64
706dfdbac6e...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/ttf16.dll
windows7-x64
5$SYSDIR/ttf16.dll
windows10-2004-x64
5RICHED20.dll
windows7-x64
5RICHED20.dll
windows10-2004-x64
5sarp.exe
windows7-x64
5sarp.exe
windows10-2004-x64
5sarp.htm
windows7-x64
3sarp.htm
windows10-2004-x64
3uninstal.exe
windows7-x64
7uninstal.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 18:17
Behavioral task
behavioral1
Sample
06dfdbac6e968528899fd66c4a13ba65_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06dfdbac6e968528899fd66c4a13ba65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$SYSDIR/ttf16.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$SYSDIR/ttf16.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RICHED20.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RICHED20.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
sarp.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
sarp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
sarp.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
sarp.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
uninstal.exe
Resource
win7-20240903-en
General
-
Target
uninstal.exe
-
Size
22KB
-
MD5
ab1518bab8cfc29403b09435657ad525
-
SHA1
39a5082a4abb81e4d0159838babafc6fb7ec9bf9
-
SHA256
dd8b69c21759814a785af9d513c80b962ece939ca374a814b6799c6c69c8d602
-
SHA512
1e2687232386bb4078a2a6942f0116b4ffb32d4c394967c081c8d51898fdd6ccf38e1c7c89583f0cf2b046b89562ea06fe2bb567481a531df7763d4d194c282e
-
SSDEEP
384:qxAj9COVTmig03CVbQL2KW+NOnQfbVV52YB/e1ipQJlEoN64JEMqxc2BJRns3uk0:q2jIOVaiwbQJvNvBvV5e1IQj7N6EEMqL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 A~NSISu_.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 A~NSISu_.exe -
Loads dropped DLL 4 IoCs
pid Process 1984 uninstal.exe 2176 A~NSISu_.exe 2176 A~NSISu_.exe 2176 A~NSISu_.exe -
resource yara_rule behavioral13/memory/1984-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral13/files/0x00060000000175f7-4.dat upx behavioral13/memory/1984-10-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral13/memory/2176-15-0x0000000048000000-0x0000000048089000-memory.dmp upx behavioral13/memory/2176-16-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral13/memory/2176-17-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral13/memory/2176-19-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 A~NSISu_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2176 1984 uninstal.exe 30 PID 1984 wrote to memory of 2176 1984 uninstal.exe 30 PID 1984 wrote to memory of 2176 1984 uninstal.exe 30 PID 1984 wrote to memory of 2176 1984 uninstal.exe 30 PID 1984 wrote to memory of 2176 1984 uninstal.exe 30 PID 1984 wrote to memory of 2176 1984 uninstal.exe 30 PID 1984 wrote to memory of 2176 1984 uninstal.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstal.exe"C:\Users\Admin\AppData\Local\Temp\uninstal.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5ab1518bab8cfc29403b09435657ad525
SHA139a5082a4abb81e4d0159838babafc6fb7ec9bf9
SHA256dd8b69c21759814a785af9d513c80b962ece939ca374a814b6799c6c69c8d602
SHA5121e2687232386bb4078a2a6942f0116b4ffb32d4c394967c081c8d51898fdd6ccf38e1c7c89583f0cf2b046b89562ea06fe2bb567481a531df7763d4d194c282e