Overview
overview
7Static
static
3b0aaa8a594...18.exe
windows7-x64
7b0aaa8a594...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPLATES...at.exe
windows7-x64
1$TEMPLATES...at.exe
windows10-2004-x64
3$TEMPLATES/readme.exe
windows7-x64
3$TEMPLATES/readme.exe
windows10-2004-x64
3$PROGRAMFI...ar.dll
windows7-x64
7$PROGRAMFI...ar.dll
windows10-2004-x64
7$TEMPLATES...cs.dll
windows7-x64
3$TEMPLATES...cs.dll
windows10-2004-x64
3KKDock.exe
windows7-x64
3KKDock.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
b0aaa8a5948c20836ba7b590cd451551_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b0aaa8a5948c20836ba7b590cd451551_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMPLATES/installstat.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMPLATES/installstat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$TEMPLATES/readme.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$TEMPLATES/readme.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/Baidu/AddressBar/AddressBar_Tmp/AddressBar.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/Baidu/AddressBar/AddressBar_Tmp/AddressBar.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$TEMPLATES/statistics.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$TEMPLATES/statistics.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
KKDock.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
KKDock.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
37KB
-
MD5
2a920c23ffc5970a07d5eb9f90ee1d5d
-
SHA1
462e6c75d4757e5bf0ef2224b616f09487611ee2
-
SHA256
9de19940309743c988de7e8f445b0baffb1c8297696ccb1839ab6c2035fcc106
-
SHA512
a0a8795271f60e7190087f794900b9ae67a9e59d25bbbe1d510b7c387672131fab0f7fdf35b1d167f1595e0afe7f55260f1003e3a76baaf84e4c7dcac7d113bc
-
SSDEEP
768:EHJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJqTQvDXACvV:EpgpHzb9dZVX9fHMvG0D3XJG8pV
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
Au_.exepid Process 3896 Au_.exe -
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid Process 3896 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
uninst.exeAu_.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule behavioral18/files/0x000a000000023b99-3.dat nsis_installer_1 behavioral18/files/0x000a000000023b99-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
uninst.exedescription pid Process procid_target PID 3036 wrote to memory of 3896 3036 uninst.exe 82 PID 3036 wrote to memory of 3896 3036 uninst.exe 82 PID 3036 wrote to memory of 3896 3036 uninst.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD52a920c23ffc5970a07d5eb9f90ee1d5d
SHA1462e6c75d4757e5bf0ef2224b616f09487611ee2
SHA2569de19940309743c988de7e8f445b0baffb1c8297696ccb1839ab6c2035fcc106
SHA512a0a8795271f60e7190087f794900b9ae67a9e59d25bbbe1d510b7c387672131fab0f7fdf35b1d167f1595e0afe7f55260f1003e3a76baaf84e4c7dcac7d113bc