Overview
overview
7Static
static
3098ac0abec...18.exe
windows7-x64
7098ac0abec...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/exdll.dll
windows7-x64
3$PLUGINSDIR/exdll.dll
windows10-2004-x64
3AutoUpdate.dll
windows7-x64
3AutoUpdate.dll
windows10-2004-x64
3CaiHong.dll
windows7-x64
3CaiHong.dll
windows10-2004-x64
3CaiHong.exe
windows7-x64
7CaiHong.exe
windows10-2004-x64
7Reporter.dll
windows7-x64
3Reporter.dll
windows10-2004-x64
3msimg32.dll
windows7-x64
3msimg32.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/exdll.dll
windows7-x64
3$PLUGINSDIR/exdll.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
098ac0abecc4ef0b1523053dda3cd4dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
098ac0abecc4ef0b1523053dda3cd4dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/exdll.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/exdll.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
AutoUpdate.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
AutoUpdate.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
CaiHong.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CaiHong.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
CaiHong.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CaiHong.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Reporter.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Reporter.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
msimg32.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
uninstall.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/exdll.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/exdll.dll
Resource
win10v2004-20240802-en
General
-
Target
uninstall.exe
-
Size
117KB
-
MD5
a224dbc05d9558e4ff2dfe4d46a76e94
-
SHA1
8dec99fedd8379fa1d8dc659324e3bf8c6b757d4
-
SHA256
42a957607dcfd5d29ea81fb3a53959338d866384eabb96cab345ce8b08da5c98
-
SHA512
21ee820b0f61108d31717df7e2be7810c6d25837b20a74d38340d1e4d7ad15e726f31c67ef820d6f08c4cbfa1290c46fb4af5b6089b9f2566ae981e10d48b3ff
-
SSDEEP
1536:HjmS7uQiR7abLJqiX0DImJfQcREYRNAU5xSgiZ9tROEt7mfo3gOj8t1I2rotrXHk:HjhhbyDImJiq+pROc7Xp8t1KE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4184 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral20/files/0x000b000000023b77-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 4184 3368 uninstall.exe 85 PID 3368 wrote to memory of 4184 3368 uninstall.exe 85 PID 3368 wrote to memory of 4184 3368 uninstall.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5a224dbc05d9558e4ff2dfe4d46a76e94
SHA18dec99fedd8379fa1d8dc659324e3bf8c6b757d4
SHA25642a957607dcfd5d29ea81fb3a53959338d866384eabb96cab345ce8b08da5c98
SHA51221ee820b0f61108d31717df7e2be7810c6d25837b20a74d38340d1e4d7ad15e726f31c67ef820d6f08c4cbfa1290c46fb4af5b6089b9f2566ae981e10d48b3ff