Overview
overview
10Static
static
3da57012639...18.exe
windows7-x64
7da57012639...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Flash.dll
windows7-x64
3Flash.dll
windows10-2004-x64
3GLWorker.exe
windows7-x64
10GLWorker.exe
windows10-2004-x64
10Heavy Weap...xe.exe
windows7-x64
10Heavy Weap...xe.exe
windows10-2004-x64
10Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3bass.dll
windows7-x64
3bass.dll
windows10-2004-x64
3readme.html
windows7-x64
3readme.html
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
da570126399784f6d6f251b7edd5c2b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da570126399784f6d6f251b7edd5c2b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Flash.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Flash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
GLWorker.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
GLWorker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Heavy Weapon Deluxe.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Heavy Weapon Deluxe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
bass.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
readme.html
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
readme.html
Resource
win10v2004-20241007-en
General
-
Target
Uninstall.exe
-
Size
123KB
-
MD5
547babef61d913ab1a8ab5391fb65195
-
SHA1
0004077c7679e5b7fb9cdaeb842ca7c631d0f09f
-
SHA256
2bf784a7ba86703a5317b656312eac2a18242cc1492b7d5d2eb8b0ac797491ee
-
SHA512
498f154205794a709ba39aea766d322c300aeee401a104288182cdf731873a374e6ab77e37b0e4227e6f195286def90ea674be33917402e5e33d8aa3b143badb
-
SSDEEP
1536:HpgpHzb9dZVX9fHMvG0D3XJcnGpbeGLwDg1V/0H1msZ+bpualJf23lsb2G:JgXdZt9P6D3XJhpKG0cz/WmBO3ab2G
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2668 Uninstall.exe 2684 Au_.exe 2684 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral19/files/0x000400000001dfd8-2.dat nsis_installer_1 behavioral19/files/0x000400000001dfd8-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2684 2668 Uninstall.exe 30 PID 2668 wrote to memory of 2684 2668 Uninstall.exe 30 PID 2668 wrote to memory of 2684 2668 Uninstall.exe 30 PID 2668 wrote to memory of 2684 2668 Uninstall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD5757441e3a47931001ded4461cbc25a41
SHA1b7a2b9b5918a498656e9e2a1fa6c0f693780208b
SHA256c9facf9ff51b7df4607886e5c7d4e865d690aa7ff84ee7f103b9db53108af8e5
SHA512abbe9718329309d4b796db00757ddc7965bab91428f334388c234768119048073c40305670fe5908859fca779824e1060c24960472e04c75af54948fff1a2b55
-
Filesize
242B
MD55ebba6a273e7a79edada9ecd9dcb2035
SHA198f925305b8238f60bf0bb6c12e01717a651eb6f
SHA256fb734cbc8728911aae956a5b2adcca83189e328dce9dbcf0c8f0271a7f947f0c
SHA5126a1ca32a5d21040ad4a7e8d402a231a30dfc831477044f84ed2ce5b56e69ddad309fe45307ab45c620f5f049e0a5b293d7a7d7c6d202c929030ecee7b4e01fef
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
123KB
MD5547babef61d913ab1a8ab5391fb65195
SHA10004077c7679e5b7fb9cdaeb842ca7c631d0f09f
SHA2562bf784a7ba86703a5317b656312eac2a18242cc1492b7d5d2eb8b0ac797491ee
SHA512498f154205794a709ba39aea766d322c300aeee401a104288182cdf731873a374e6ab77e37b0e4227e6f195286def90ea674be33917402e5e33d8aa3b143badb