Overview
overview
7Static
static
512c1b32bf6...18.exe
windows7-x64
712c1b32bf6...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ur.dll
windows7-x64
3$PLUGINSDI...ur.dll
windows10-2004-x64
3uninst.exe
windows7-x64
uninst.exe
windows10-2004-x64
Analysis
-
max time kernel
9s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 09:23
Behavioral task
behavioral1
Sample
12c1b32bf60719d1ae4d4e6a92e1a3f7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12c1b32bf60719d1ae4d4e6a92e1a3f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/isecur.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/isecur.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240903-en
Errors
General
-
Target
uninst.exe
-
Size
25KB
-
MD5
1fa0b902733e4bd02d4df3e5f8a88e2c
-
SHA1
ee5b6aa728ec9e3bc77f3ad98b497f64bb98e2f9
-
SHA256
f22b5fc284941a8be258378c57ae1a1c89e52f871ccb0f29c2ec18ee8c888376
-
SHA512
75139436ad94520e7d44b29e3116d3ad79f0ba3946236794066ca3d8fec853b81193ef5393e764858a0c02e3bb0b7adbc6bd8d7c5d871a5e6ace602c341a6934
-
SSDEEP
768:T2d/1YcVRHJxjnaDOGKiFdWEgzyyyUyyyyyiMvc5+9a3:YtVRpxjnaaGKsUlMvcEa3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2656 uninst.exe 2568 Au_.exe 2568 Au_.exe 2568 Au_.exe -
resource yara_rule behavioral7/memory/2656-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral7/files/0x0006000000016d4e-5.dat upx behavioral7/memory/2568-17-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral7/memory/2568-16-0x0000000000240000-0x0000000000274000-memory.dmp upx behavioral7/memory/2656-11-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral7/memory/2568-20-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 2568 Au_.exe Token: SeRestorePrivilege 2568 Au_.exe Token: SeBackupPrivilege 2568 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2568 2656 uninst.exe 28 PID 2656 wrote to memory of 2568 2656 uninst.exe 28 PID 2656 wrote to memory of 2568 2656 uninst.exe 28 PID 2656 wrote to memory of 2568 2656 uninst.exe 28 PID 2656 wrote to memory of 2568 2656 uninst.exe 28 PID 2656 wrote to memory of 2568 2656 uninst.exe 28 PID 2656 wrote to memory of 2568 2656 uninst.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2660
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD51fa0b902733e4bd02d4df3e5f8a88e2c
SHA1ee5b6aa728ec9e3bc77f3ad98b497f64bb98e2f9
SHA256f22b5fc284941a8be258378c57ae1a1c89e52f871ccb0f29c2ec18ee8c888376
SHA51275139436ad94520e7d44b29e3116d3ad79f0ba3946236794066ca3d8fec853b81193ef5393e764858a0c02e3bb0b7adbc6bd8d7c5d871a5e6ace602c341a6934