Overview
overview
7Static
static
3113f59a116...18.exe
windows7-x64
7113f59a116...18.exe
windows10-2004-x64
7Launch.exe
windows7-x64
3Launch.exe
windows10-2004-x64
3MenuOrange.dll
windows7-x64
6MenuOrange.dll
windows10-2004-x64
6OIExt.dll
windows7-x64
3OIExt.dll
windows10-2004-x64
3OrangeInside.exe
windows7-x64
3OrangeInside.exe
windows10-2004-x64
3OrangeInstaller.dll
windows7-x64
3OrangeInstaller.dll
windows10-2004-x64
3OrangeInstaller.dll
windows7-x64
3OrangeInstaller.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7english.dll
windows7-x64
1english.dll
windows10-2004-x64
1french.dll
windows7-x64
1french.dll
windows10-2004-x64
1libcurld.dll
windows7-x64
3libcurld.dll
windows10-2004-x64
3content/or...ide.js
windows7-x64
3content/or...ide.js
windows10-2004-x64
3uninstall_NSIS.exe
windows7-x64
3uninstall_NSIS.exe
windows10-2004-x64
3Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
113f59a116435802d085bf18bac06953_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
113f59a116435802d085bf18bac06953_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Launch.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Launch.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
MenuOrange.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
MenuOrange.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
OIExt.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
OIExt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
OrangeInside.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
OrangeInside.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
OrangeInstaller.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
OrangeInstaller.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
OrangeInstaller.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
OrangeInstaller.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
english.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
english.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
french.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
french.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
libcurld.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
libcurld.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
content/orangeinside.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
content/orangeinside.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
uninstall_NSIS.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
uninstall_NSIS.exe
Resource
win10v2004-20240802-en
General
-
Target
Uninstall.exe
-
Size
197KB
-
MD5
22c4877113aafa79d07bf7d7eaea29ac
-
SHA1
2a0157b7d866a85829a89378868f13672a2098f6
-
SHA256
59588cd27428f32d3ed3a09364e15923bd11753367dd63ea3b82bb4b624ca81c
-
SHA512
da36296f5f2d6b56679cdba92e0db09b14ad0924876efa764036db48047f5449881e094af6e88d72d13e91396a8715aa6c59dc19729dfca9639b7186e054aa12
-
SSDEEP
3072:qJQpBhxdE8Tekid+PcDI7UYps5Y+2dVw1hh3HyYGpjpoMx5kske:qJ1srGY5dy1hhcPZ0e
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Uninstall.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 Uninstall.exe 4544 Uninstall.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3512 4544 Uninstall.exe 84 PID 4544 wrote to memory of 3512 4544 Uninstall.exe 84 PID 4544 wrote to memory of 3512 4544 Uninstall.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732B
MD5010bb46a84a78a5538fef7b8bb4535e7
SHA1e15b8be38d5ceb74ce26fac7f525b043c7015e62
SHA256375a4dc838240b7fb8a32e87eb2e562984d4173692e2fe18946e692a91e93d96
SHA5123bfd1457662843c6bc221a12466354a31188f1a588186a2090a334d903c9341ff6b5e1c6877b1d69a29db873ea1ad5468c674966580357820af395f25c54a637