Overview
overview
10Static
static
3c35b3b6eac...18.exe
windows7-x64
7c35b3b6eac...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3CI3.exe
windows7-x64
10CI3.exe
windows10-2004-x64
10GLWorker.exe
windows7-x64
10GLWorker.exe
windows10-2004-x64
10Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3bass.dll
windows7-x64
3bass.dll
windows10-2004-x64
3readme.htm
windows7-x64
3readme.htm
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
CI3.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
CI3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
GLWorker.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
GLWorker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
bass.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
bass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
readme.htm
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
readme.htm
Resource
win10v2004-20241007-en
General
-
Target
Uninstall.exe
-
Size
93KB
-
MD5
09028d06b307f49555dffb76dc82c880
-
SHA1
8f187451912fa4b5e0e3de3406d1d426e48f3fc1
-
SHA256
0b0b36f894a702ac55405422733ccb22506c68e29848ae7eac9f0a4ce8cc597a
-
SHA512
505f537225eefd85f94c0807b7452c1df41c32f6d79203a2e9a5cc166385605176a68217808e505389e08fb8a61211728643ab4acea381e06dc23145c257c94f
-
SSDEEP
1536:zCaIoX1oYOcbTMV88TXJLE/oRdvislP2jLE+Db6FPhjtxQsOk63dcBuX6gSzR/7e:zCaZ2Yrb0VTXJY/oqsl6D0ZWX3we6Z9a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2976 Au_.exe 2976 Au_.exe 2976 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral18/files/0x0009000000023c9e-3.dat nsis_installer_1 behavioral18/files/0x0009000000023c9e-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 2976 4544 Uninstall.exe 80 PID 4544 wrote to memory of 2976 4544 Uninstall.exe 80 PID 4544 wrote to memory of 2976 4544 Uninstall.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5714e0ecd29f9ec555f350f38672726c7
SHA1555b1492e782d7a30f280f2aecb64c642c1aaad3
SHA25621fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3
SHA512ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
237B
MD5c501b5ed299349043148ce84b52c7a25
SHA164bcfa7b2c1faa7756be1b77386f9b81d965edb2
SHA2567310fd05881df537d5968b5909e17fa2d6afe005561a2b40f10edd39e75c0b61
SHA5122b3b5e6422fb836198fddf9b6cb2fdd2808eeb6a471beebe43d8b8f28eea7debaba5d6b66fb96305a28df1ad0dfd2ceaa01b324e9f6cb5ce520f23d02aee6f3e
-
Filesize
596B
MD567926734eff903b67d43388dccc7e268
SHA1d9b43d1405ef4b032ca216219493fb2863e1a276
SHA256f997199306e68a97c290fc8e60155428244d35bfb78f41b8da930806aa0ff04a
SHA512c0b11dd4c5dd9e83e50aebdd7f32a6c1f41e47ee5a377909158361b785cf59a5095f1ffb044c8af6f37caa35f80a51dad0ccd86ae4e3a27c8fe6f2d7d2809efe
-
Filesize
93KB
MD509028d06b307f49555dffb76dc82c880
SHA18f187451912fa4b5e0e3de3406d1d426e48f3fc1
SHA2560b0b36f894a702ac55405422733ccb22506c68e29848ae7eac9f0a4ce8cc597a
SHA512505f537225eefd85f94c0807b7452c1df41c32f6d79203a2e9a5cc166385605176a68217808e505389e08fb8a61211728643ab4acea381e06dc23145c257c94f