Overview
overview
10Static
static
108512ebf391...18.exe
windows7-x64
78512ebf391...18.exe
windows10-2004-x64
7$APPDATA/p...ry.dll
windows7-x64
3$APPDATA/p...ry.dll
windows10-2004-x64
3$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
3$PLUGINSDI...nd.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3$TEMP/$_53...in.dll
windows7-x64
3$TEMP/$_53...in.dll
windows10-2004-x64
3WoWBox.exe
windows7-x64
10WoWBox.exe
windows10-2004-x64
10uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...nd.dll
windows7-x64
3$PLUGINSDI...nd.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 10:48
Behavioral task
behavioral1
Sample
8512ebf39126afc00e171b784940c5f1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8512ebf39126afc00e171b784940c5f1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/pipfactory.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/pipfactory.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/K8NsisExtend.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/K8NsisExtend.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$TEMP/$_53_/K8Skin.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$TEMP/$_53_/K8Skin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
WoWBox.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
WoWBox.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/K8NsisExtend.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/K8NsisExtend.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
1.8MB
-
MD5
0476fe3408086ad9503632c5c3b084f3
-
SHA1
3d2c4cae38f9faccb05f3b6d1e653661f5397807
-
SHA256
eabd927f02c19fcce33816f42866f2fef7aa24910bc1b692497585ecc4007611
-
SHA512
b7bda3fccfc420be4203cfeb7d089f9c2b821e158e59801640af0e35ba24144c36f0db50cc047d937507bd3fb88f1f4270e091b0547a365741dc555280eebb81
-
SSDEEP
49152:dBewS4SitFdq7kGpM6/cEbTWbf2UIhXdK2WP2nU:P1V9/GN2+ndK1KU
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral26/files/0x0007000000023cd7-12.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2016 Au_.exe -
Loads dropped DLL 9 IoCs
pid Process 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe 2016 Au_.exe -
resource yara_rule behavioral26/files/0x0007000000023cd7-12.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3460 2016 WerFault.exe 84 1768 2016 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral26/files/0x0007000000023cd5-3.dat nsis_installer_1 behavioral26/files/0x0007000000023cd5-3.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2016 2724 uninst.exe 84 PID 2724 wrote to memory of 2016 2724 uninst.exe 84 PID 2724 wrote to memory of 2016 2724 uninst.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 11483⤵
- Program crash
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 11483⤵
- Program crash
PID:1768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2016 -ip 20161⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 2016 -ip 20161⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5159d347c741931336de9360096c6cf88
SHA1ab53122b0d28e95acabaf1ca079054052a94ad8c
SHA256a73a5aef9eb1595cbdfbc02187b51c96f39033f0973f7d6758024c525407038c
SHA512017066ed58ac34dbc919dbffc3fa7f07c31f61b3ac1f1a714aceb14db48ee45208129a5aaa7ca88bd34dddf7936f5211a58a385dc51408cd1902465436a79de0
-
Filesize
376KB
MD56f2e568ad29d065ecb9073e0e943158b
SHA11d6f747b5abe0ba06eb70a4f93a2dfe046342094
SHA2562f2f55967767478491d982c07d7197db914a3cf22d57b9ded917c1e9173f8431
SHA5128cacbf539926f7a7f4be1963ef92fd83facbce7d68f1a2c9cc0554a86b2307486f00b3d678f417746db054654d0c9c1675a9d0633b01817153ca5168a0c7de47
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
9KB
MD5ab73c0c2a23f913eabdc4cb24b75cbad
SHA16569d2863d54c88dcf57c843fc310f6d9571a41e
SHA2563d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457
SHA51299d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8
-
Filesize
21KB
MD5ab467b8dfaa660a0f0e5b26e28af5735
SHA1596abd2c31eaff3479edf2069db1c155b59ce74d
SHA256db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73
SHA5127d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301
-
Filesize
1.8MB
MD50476fe3408086ad9503632c5c3b084f3
SHA13d2c4cae38f9faccb05f3b6d1e653661f5397807
SHA256eabd927f02c19fcce33816f42866f2fef7aa24910bc1b692497585ecc4007611
SHA512b7bda3fccfc420be4203cfeb7d089f9c2b821e158e59801640af0e35ba24144c36f0db50cc047d937507bd3fb88f1f4270e091b0547a365741dc555280eebb81