Overview
overview
10Static
static
3b7938b29a7...18.exe
windows7-x64
10b7938b29a7...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3152605369.html
windows7-x64
3152605369.html
windows10-2004-x64
31916524053.html
windows7-x64
31916524053.html
windows10-2004-x64
33072838935.html
windows7-x64
33072838935.html
windows10-2004-x64
332093631739.html
windows7-x64
332093631739.html
windows10-2004-x64
3910218026.html
windows7-x64
3910218026.html
windows10-2004-x64
3SuggestBox.js
windows7-x64
3SuggestBox.js
windows10-2004-x64
3Uninstaller.exe
windows7-x64
Uninstaller.exe
windows10-2004-x64
ads-the-in...d.html
windows7-x64
3ads-the-in...d.html
windows10-2004-x64
3locales308946821.html
windows7-x64
3locales308946821.html
windows10-2004-x64
3Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
152605369.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
152605369.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1916524053.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1916524053.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3072838935.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3072838935.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
32093631739.html
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
32093631739.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
910218026.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
910218026.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SuggestBox.js
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
SuggestBox.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ads-the-internet-the-icon-revealed.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ads-the-internet-the-icon-revealed.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales308946821.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
locales308946821.html
Resource
win10v2004-20241007-en
Errors
General
-
Target
Uninstaller.exe
-
Size
43KB
-
MD5
4a269bf092c7ac2df634e87f5b3351af
-
SHA1
554216db1084068ae2c93a19ca15359031ee169f
-
SHA256
4005800e476d055bc524bf46624a854f24de0e7912bfe7f5b9bbec841b1516da
-
SHA512
7efcb35cfaeaddda7245fc43baf3752fc9d44e73bdd9d4a5356efda72de219b72f07ca2fd75312198a8310b5e773ba2a1f916e967d878a34ca3ab12f8ed96d6d
-
SSDEEP
768:CqjtOoh/pZbvc+HX+fFXSJA/mIj6qkzry8F9zGPVzI6ihZUAFM:zjoUxZbE+HOI66qkryz9zI6i8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2388 Uninstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2084 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2084 2388 Uninstaller.exe 30 PID 2388 wrote to memory of 2084 2388 Uninstaller.exe 30 PID 2388 wrote to memory of 2084 2388 Uninstaller.exe 30 PID 2388 wrote to memory of 2084 2388 Uninstaller.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\Uninstaller.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2840
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD54a269bf092c7ac2df634e87f5b3351af
SHA1554216db1084068ae2c93a19ca15359031ee169f
SHA2564005800e476d055bc524bf46624a854f24de0e7912bfe7f5b9bbec841b1516da
SHA5127efcb35cfaeaddda7245fc43baf3752fc9d44e73bdd9d4a5356efda72de219b72f07ca2fd75312198a8310b5e773ba2a1f916e967d878a34ca3ab12f8ed96d6d