Overview
overview
8Static
static
7ab40b4d665...18.exe
windows7-x64
3ab40b4d665...18.exe
windows10-2004-x64
3$PLUGINSDIR/Aero.dll
windows7-x64
5$PLUGINSDIR/Aero.dll
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...mp.exe
windows7-x64
1$PLUGINSDI...mp.exe
windows10-2004-x64
3$PLUGINSDIR/RP.exe
windows7-x64
4$PLUGINSDIR/RP.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
$PLUGINSDI...er.exe
windows10-2004-x64
7$PLUGINSDIR/Aero.dll
windows7-x64
5$PLUGINSDIR/Aero.dll
windows10-2004-x64
5$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...le.dll
windows7-x64
3$PLUGINSDI...le.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
Uninstall.exe
windows10-2004-x64
$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 06:06
Behavioral task
behavioral1
Sample
ab40b4d6657e67053c9e36f9f6bf25cf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab40b4d6657e67053c9e36f9f6bf25cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Aero.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Aero.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/JpgToBmp.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/JpgToBmp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/RP.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/RP.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/UXTheme Patcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UXTheme Patcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Aero.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Aero.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisFile.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisFile.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Uninstall.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/GetVersion.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Errors
General
-
Target
$PLUGINSDIR/UXTheme Patcher.exe
-
Size
155KB
-
MD5
3156c1dfc05cb509aad5cc94a77511ee
-
SHA1
e9be935ea42141277d618e02f49fb77df56d7279
-
SHA256
602fa4344d7fdb830e6c0f8b1f94c38fae71adf75a194bd6e86028d849677744
-
SHA512
e043ce7e2a84d960632abd9abc56baa8b749cb75951ad655620c660583a9dbcadf0b8d73f5ea83a505cedd41a5ce2ffe760375836844fac2ec85d3d1897a07d0
-
SSDEEP
3072:WQIURTXJ6stVm12xqQzIQsAYG33xb6nCaPpVti4pfUtcT1Gt+4:WsdtEgxn2ngxb6nCaPpVtiCcMI3
Malware Config
Signatures
-
Possible privilege escalation attempt 6 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid Process 444 takeown.exe 1476 icacls.exe 2792 takeown.exe 2732 icacls.exe 2296 takeown.exe 2396 icacls.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral15/files/0x0003000000021098-16.dat acprotect -
Loads dropped DLL 64 IoCs
Processes:
UXTheme Patcher.exepid Process 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe 2384 UXTheme Patcher.exe -
Modifies file permissions 1 TTPs 6 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exepid Process 1476 icacls.exe 2792 takeown.exe 2732 icacls.exe 2296 takeown.exe 2396 icacls.exe 444 takeown.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Drops file in System32 directory 12 IoCs
Processes:
UXTheme Patcher.exedescription ioc Process File created C:\Windows\System32\uxtheme.dll.backup UXTheme Patcher.exe File created C:\Windows\System32\themeui.dll.backup UXTheme Patcher.exe File created C:\Windows\System32\themeui.dll.new UXTheme Patcher.exe File opened for modification C:\Windows\system32\themeui.dll.new UXTheme Patcher.exe File opened for modification C:\Windows\system32\themeui.dll.old UXTheme Patcher.exe File created C:\Windows\System32\themeservice.dll.new UXTheme Patcher.exe File created C:\Windows\System32\uxtheme.dll.new UXTheme Patcher.exe File opened for modification C:\Windows\system32\uxtheme.dll.new UXTheme Patcher.exe File opened for modification C:\Windows\system32\uxtheme.dll.old UXTheme Patcher.exe File created C:\Windows\System32\themeservice.dll.backup UXTheme Patcher.exe File opened for modification C:\Windows\system32\themeservice.dll.new UXTheme Patcher.exe File opened for modification C:\Windows\system32\themeservice.dll.old UXTheme Patcher.exe -
Processes:
resource yara_rule behavioral15/files/0x0003000000021098-16.dat upx behavioral15/memory/2384-18-0x00000000746B0000-0x00000000746BA000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
Processes:
UXTheme Patcher.exedescription ioc Process File created C:\Program Files (x86)\UltraUXThemePatcher\Uninstall.exe UXTheme Patcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
UXTheme Patcher.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UXTheme Patcher.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
takeown.exetakeown.exetakeown.exeUXTheme Patcher.exedescription pid Process Token: SeTakeOwnershipPrivilege 444 takeown.exe Token: SeTakeOwnershipPrivilege 2792 takeown.exe Token: SeTakeOwnershipPrivilege 2296 takeown.exe Token: SeShutdownPrivilege 2384 UXTheme Patcher.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
UXTheme Patcher.exedescription pid Process procid_target PID 2384 wrote to memory of 444 2384 UXTheme Patcher.exe 31 PID 2384 wrote to memory of 444 2384 UXTheme Patcher.exe 31 PID 2384 wrote to memory of 444 2384 UXTheme Patcher.exe 31 PID 2384 wrote to memory of 444 2384 UXTheme Patcher.exe 31 PID 2384 wrote to memory of 1476 2384 UXTheme Patcher.exe 33 PID 2384 wrote to memory of 1476 2384 UXTheme Patcher.exe 33 PID 2384 wrote to memory of 1476 2384 UXTheme Patcher.exe 33 PID 2384 wrote to memory of 1476 2384 UXTheme Patcher.exe 33 PID 2384 wrote to memory of 2792 2384 UXTheme Patcher.exe 35 PID 2384 wrote to memory of 2792 2384 UXTheme Patcher.exe 35 PID 2384 wrote to memory of 2792 2384 UXTheme Patcher.exe 35 PID 2384 wrote to memory of 2792 2384 UXTheme Patcher.exe 35 PID 2384 wrote to memory of 2732 2384 UXTheme Patcher.exe 37 PID 2384 wrote to memory of 2732 2384 UXTheme Patcher.exe 37 PID 2384 wrote to memory of 2732 2384 UXTheme Patcher.exe 37 PID 2384 wrote to memory of 2732 2384 UXTheme Patcher.exe 37 PID 2384 wrote to memory of 2296 2384 UXTheme Patcher.exe 39 PID 2384 wrote to memory of 2296 2384 UXTheme Patcher.exe 39 PID 2384 wrote to memory of 2296 2384 UXTheme Patcher.exe 39 PID 2384 wrote to memory of 2296 2384 UXTheme Patcher.exe 39 PID 2384 wrote to memory of 2396 2384 UXTheme Patcher.exe 41 PID 2384 wrote to memory of 2396 2384 UXTheme Patcher.exe 41 PID 2384 wrote to memory of 2396 2384 UXTheme Patcher.exe 41 PID 2384 wrote to memory of 2396 2384 UXTheme Patcher.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\UXTheme Patcher.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\UXTheme Patcher.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /f "C:\Windows\system32\uxtheme.dll"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" "C:\Windows\system32\uxtheme.dll" /grant Admin:f2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1476
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /f "C:\Windows\system32\themeui.dll"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" "C:\Windows\system32\themeui.dll" /grant Admin:f2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2732
-
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /f "C:\Windows\system32\themeservice.dll"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" "C:\Windows\system32\themeservice.dll" /grant Admin:f2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2396
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1916
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD55f728e4e6b970db76c64be8ca3cafc87
SHA1b7481efd9f6938903214451d792a8b13a645c922
SHA256aea40659bdb08337064640ea8b4f171881d37456b37b3e2899349ac04f0889c5
SHA5122cc4e870290f8faddc8eca1a03a1efb34711b3951e263a79f259fd998a9a1f957dbf58c110c5fe64febd414ec7a22e125353f9d5c363866bd0d4298452fdadc8
-
Filesize
43KB
MD5bf69cdedb4f36015e43dc8117134f058
SHA1717b59942919209a01dc88218bb9e28517ff63c5
SHA256b9737b8b11687bc241e150a1a9eceee0fa979dd4ab30c01e335f970564f0c3c7
SHA5122cfce2abcd9806275f44ad2df6f5259a9e02e88802e7c4359665ae415dfa88d478447eea80d81c12f130c544c8a8a71a2706d95ce4cccf5e5d0180b464a3629c
-
Filesize
2.7MB
MD5274c75ff99e6bc973232dfb4d450cdcd
SHA1e000812516d3d60d6fcf340f34d13f51e4d23912
SHA25635415d2a7d97ac2fd9ccfe28a93c3aff0f4fa9d83636699b4d89139dc9d23f34
SHA512f1e922c74725e29f980a63c369c86f8d56e91e7f83652830633941f918777207ec2941ba91fe2a3e259851f45d92defde538f31324788aba4cce051247a674a2
-
Filesize
324KB
MD52e08363a75712e753f4d5b3b34531584
SHA1323190cd2c21152df3dedfee1ca701f11e355a01
SHA25666fd0a342d0c56f2d73edc7ee4c0f7dc3c8ab3ab77be1a8f5083f6984f4be754
SHA512b8c00275a61236de4145007f7301dff452300ba3d7807684ac226ab2a61e3712223f31c6f431346a5e452ddd5585aa867d2e2b6b1b7c147b24ce110ca6615dc3
-
Filesize
6KB
MD5243bf44688b131c3171f2827a93e39dc
SHA107e9c7bd16ae47953e42c06ae2606de188386f35
SHA25604a577df50431eb0ff6fb103566402bf66c50415bcc1f8a86b9c235053131455
SHA512a1a8c21d38c54a43d1c6c394f481dfbddcb359c617e9928ecca8f84d47354616a78d20735a1fe7bebd21626c21cf96d0e1a69e3e98f6b35f2a774cc0244f9516
-
Filesize
9KB
MD5225f776172f1baccd2721a6e5d512b36
SHA12dbbc86f7b0285682880a627b56a75de09f4bed6
SHA256ecfcbe30f5b248673f9cbebb734b9981ed14b06380ea787c563d67b30e2d069e
SHA5124b99a5ac68122501a5913cf54bd3ae99d851d57656b0e136980122739cceef739fa2d5ea097f2442068b9489a4c25ea0884653c41d85f27f25996792bf6c21bb
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
5KB
MD5a35adabef191a1d5870096543ffc18ec
SHA176a77d50b8f0be5a77fdb7b71a661a356ead1b7f
SHA256bb5be80416d8e381fbcb0f03ea3433d94a75786e3842e8cfe1b7b8bd57354457
SHA51297eb8186abc0ae5a6c1858b78042c41fa377dea33ea0bae3c6957b7a22486ba0f1e0a4a43d817627bbba85d5de786c82e05d7505dc7df62bff51439fd0f8401c