Overview
overview
10Static
static
323850843bd...18.exe
windows7-x64
1023850843bd...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
23850843bdf2d04e40039d2c8bf0c67c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23850843bdf2d04e40039d2c8bf0c67c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
49KB
-
MD5
4205c8c862849d5ca498f5e35b4da8bc
-
SHA1
29eb61967b1311784cda38d7c514aad9e7146081
-
SHA256
8d90c415c90c0fcddd4516083f2d4e418fc455bb21aeb7b89770cedde9f3295f
-
SHA512
4fa5d56e0f712e7f89847389d7259fb70a840eed13d4edfc1ee0c223bab4c4c858e78f22860b0913c596bd40078db5d446aa447aaa22cb9c99aee05ab39cc6b1
-
SSDEEP
1536:SDp2fcDwyRmqf5i1qlYzIQgdLeAyNxEZT:St2fc8yRmqM1qlYzIQceAXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2460 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2460 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2460 1320 uninst.exe 31 PID 1320 wrote to memory of 2460 1320 uninst.exe 31 PID 1320 wrote to memory of 2460 1320 uninst.exe 31 PID 1320 wrote to memory of 2460 1320 uninst.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD54205c8c862849d5ca498f5e35b4da8bc
SHA129eb61967b1311784cda38d7c514aad9e7146081
SHA2568d90c415c90c0fcddd4516083f2d4e418fc455bb21aeb7b89770cedde9f3295f
SHA5124fa5d56e0f712e7f89847389d7259fb70a840eed13d4edfc1ee0c223bab4c4c858e78f22860b0913c596bd40078db5d446aa447aaa22cb9c99aee05ab39cc6b1