Overview
overview
10Static
static
3d95c6471b6...18.exe
windows7-x64
10d95c6471b6...18.exe
windows10-2004-x64
7$PLUGINSDIR/docks.dll
windows7-x64
3$PLUGINSDIR/docks.dll
windows10-2004-x64
3ns.html
windows7-x64
3ns.html
windows10-2004-x64
3stub.js
windows7-x64
3stub.js
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
d95c6471b6a983d7148ad287b9e31d3a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d95c6471b6a983d7148ad287b9e31d3a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/docks.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/docks.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ns.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ns.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
stub.js
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
stub.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
uninst.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
61KB
-
MD5
647642f37e6d7f90cbe981c0fe844d45
-
SHA1
2f131081cde2d4ab86c70239bd7631419e6bcf35
-
SHA256
aada3d8818500a5ff36daf2e1ab96fd9da92986ed34e694795942d6e617e1eb2
-
SHA512
ccce0748bc731d527d62f981ac718eb81ac4a3e789d1bc7e5a9c8227a3b2fdfe756964381c4f5ed0749b4f25f141ea8cdbe0a129cd88b2c7e0e4163b51034fdf
-
SSDEEP
1536:DTdm9B9lYypfMXvugHQ0DbLiNuPYRN6QcI0m27:D4lLpkXGED3iNuPqDU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4100 Un_A.exe -
Executes dropped EXE 1 IoCs
pid Process 4100 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4100 2648 uninst.exe 82 PID 2648 wrote to memory of 4100 2648 uninst.exe 82 PID 2648 wrote to memory of 4100 2648 uninst.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5647642f37e6d7f90cbe981c0fe844d45
SHA12f131081cde2d4ab86c70239bd7631419e6bcf35
SHA256aada3d8818500a5ff36daf2e1ab96fd9da92986ed34e694795942d6e617e1eb2
SHA512ccce0748bc731d527d62f981ac718eb81ac4a3e789d1bc7e5a9c8227a3b2fdfe756964381c4f5ed0749b4f25f141ea8cdbe0a129cd88b2c7e0e4163b51034fdf