Overview
overview
7Static
static
3083e6b4395...18.exe
windows7-x64
7083e6b4395...18.exe
windows10-2004-x64
7$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3CyoHash.dll
windows7-x64
3CyoHash.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
083e6b43959b97c33d60abb0c2ed812d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
083e6b43959b97c33d60abb0c2ed812d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CyoHashInstallerPlugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CyoHashInstallerPlugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
CyoHash.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
CyoHash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
61KB
-
MD5
8e546ed8df25ae2dcd9ad6849757684d
-
SHA1
1641fb8b6b208e8d677210a63315f5d48b9867f5
-
SHA256
f37191b22289a4a2993f76c45047a75134dcd6c6811dd51d347720bf4f6ac180
-
SHA512
27c3b17ec0ff0777939d24ceb599f8db60ead250d777befd5dc00da2925413cb84bf7bfcf4a34199e2da4773fd2ec65b69318342e517de91b33b1f329094ac96
-
SSDEEP
1536:sUeHiWRgkkjH8nyWmJ5gdLeAyNtrUlMRQTZU:sd/vyWmJ5ceAUUiO6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4420 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4420 Au_.exe -
Loads dropped DLL 23 IoCs
pid Process 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe 4420 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x0007000000023435-3.dat nsis_installer_1 behavioral12/files/0x0007000000023435-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3820 wrote to memory of 4420 3820 Uninstall.exe 82 PID 3820 wrote to memory of 4420 3820 Uninstall.exe 82 PID 3820 wrote to memory of 4420 3820 Uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD50bbcbaee7b703ebd55cd8658a0e8dcd3
SHA16ed448b8b67cea36eb45bfbc67fed9a6da9623e4
SHA256e67277ecc4f6c7beb3c7e586ce508677269db056c7541eacfecf6c719f559da6
SHA512604c524bd00313f6411cc9878d5c9a1db77588049feeb5bb02c971df44f8becbd18d251cc20e551b878173eb2a78be61f31352769597c6334cffc0bc2326b008
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
8KB
MD59119c6371994557db43f61887dbec301
SHA1f43aa3a2547c61a0f9d6f7e975da0a475f973c28
SHA256562e24d6cb190f12ca6f4b2943874fd6a4e434a7fcb6efefc18af66c37aa1acd
SHA512efe8fe0ad174edf0301fccbffb820064f0e6dbbda20d4b2107cc937f10ab40d0e5f98c9e91023823f7c50d7e551ba63ffd7953d9e312ff827b4471e3e39c593a
-
Filesize
61KB
MD58e546ed8df25ae2dcd9ad6849757684d
SHA11641fb8b6b208e8d677210a63315f5d48b9867f5
SHA256f37191b22289a4a2993f76c45047a75134dcd6c6811dd51d347720bf4f6ac180
SHA51227c3b17ec0ff0777939d24ceb599f8db60ead250d777befd5dc00da2925413cb84bf7bfcf4a34199e2da4773fd2ec65b69318342e517de91b33b1f329094ac96