Overview
overview
7Static
static
32759fc3e04...18.exe
windows7-x64
2759fc3e04...18.exe
windows10-2004-x64
7$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...sc.dll
windows7-x64
3$PLUGINSDI...sc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dt.dll
windows7-x64
3$PLUGINSDI...dt.dll
windows10-2004-x64
3WackyBirdHunter.exe
windows7-x64
3WackyBirdHunter.exe
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Readme.rtf
windows7-x64
4Readme.rtf
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
2759fc3e04ec20fddaa801c3ed9f402f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2759fc3e04ec20fddaa801c3ed9f402f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/cpudesc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7za.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
7za.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisdt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
WackyBirdHunter.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
WackyBirdHunter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
aminstall.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Readme.rtf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Readme.rtf
Resource
win10v2004-20241007-en
General
-
Target
Uninstall.exe
-
Size
87KB
-
MD5
ac3149c788837a0c992a16c97a5eaeee
-
SHA1
02ed08872f396b95bdbf59585684f8dd7db4afa7
-
SHA256
35e47a664caa4f41755a337c286b39cd68d0e7b9348144f222c77e4945e5c99c
-
SHA512
d7197e80cc88b21b109f2a044c546f8f43d69f16b875161e7b82d1d35e99907f8494341a33a18e75f08a1c3e973effc759bf186fc10bb7add98a7abb6a196605
-
SSDEEP
1536:0spe3RDckBV0DdkJOHR83d0cpdXwyNLIAW35pSkeVS9XaxIdPa6:0a1DdkJoR85pdXnLIA8p3eVS9XT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2108 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 Au_.exe -
Loads dropped DLL 64 IoCs
pid Process 584 Uninstall.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe 2108 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral19/files/0x00050000000194d7-2.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 584 wrote to memory of 2108 584 Uninstall.exe 31 PID 584 wrote to memory of 2108 584 Uninstall.exe 31 PID 584 wrote to memory of 2108 584 Uninstall.exe 31 PID 584 wrote to memory of 2108 584 Uninstall.exe 31 PID 584 wrote to memory of 2108 584 Uninstall.exe 31 PID 584 wrote to memory of 2108 584 Uninstall.exe 31 PID 584 wrote to memory of 2108 584 Uninstall.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252B
MD569cd3838a8becaa0d16050de6917ccb8
SHA1ac9d53342a2496f42690371a094f49a11149cf06
SHA2564f842edff745eb89bfc4e74766f49201723e6ec915955ec465927e2cfeddc8f2
SHA512c957d42901ad362edec635cd0ca35fb08a9cbdae2767146582233aa559f2f7ac85ee76419ee18829969127f40f182d61c751f47965a35fb39cd253d11a379aa8
-
Filesize
610B
MD55caca909c6e6f9884e5e513d70979e93
SHA1b9979b3fb2b3f4ad53f46f03764fe28fc22fe8dd
SHA2560093cbbd9dc0029a72e3f048415021e45e0fe01f3fa8e6a4f2de81256c140df1
SHA512780cb72c2034dd5bb7af1301fd34f714380a00d0e40f79c07cca3ff7510bb13788906cd3b11b9a91d9b5f8d77cab42c994ee812c32b7887cc38585d7fefc790e
-
Filesize
12KB
MD53c19f79ce11facc2fc4d3351dbb263e0
SHA117f4bf4b18ea7700f70ac7d825dc997be0d25f71
SHA256cfaba712ad640ce2b4890005ffcf03ed9e2a18a6cf9075295f3aaea1478896b9
SHA51205c9ac861e4fed610171fcb5fad40abc30cbf90e9c7cb13c758f52cdff568af0fdd6af968db4fb143a748c77f21c353c7cffea28cbcbd2ad17157038ab490273
-
Filesize
10KB
MD5725145e8caa39635cab9899c47c72eda
SHA130478c907551bd920bf359638b091fc5c10b5a53
SHA2561759e4f7777fb8c9ed356a7d4dc237a90e0760061685d44ea02d40ca9e359ceb
SHA512de31286ea10321f762a3b6e7c6c82177d5b6f45a82adc936fcbbc23105708cbbbec903ba94ba94e7723e80f1828393e5395ef575b37136b19de7535e74e24547
-
Filesize
5KB
MD5df4795dfabe3bc9278a73d496cc4b40d
SHA12648ded47e29ecf3e1a1cc20c631e83caf566897
SHA2562261027077f23c8dba6b72af28862832aaa059740d0f5634b46cabb14326dd10
SHA512013d9712c3d699a7f41ab3e55931c9abb421fb2eda3542da5a4831ad2f073a1b0643120cc78147db0bfcd01df98ade3045ecb2f1e252fff1dc40be845e5ae303
-
Filesize
87KB
MD5ac3149c788837a0c992a16c97a5eaeee
SHA102ed08872f396b95bdbf59585684f8dd7db4afa7
SHA25635e47a664caa4f41755a337c286b39cd68d0e7b9348144f222c77e4945e5c99c
SHA512d7197e80cc88b21b109f2a044c546f8f43d69f16b875161e7b82d1d35e99907f8494341a33a18e75f08a1c3e973effc759bf186fc10bb7add98a7abb6a196605