Overview
overview
10Static
static
3f154c92cb4...18.exe
windows7-x64
7f154c92cb4...18.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3avsuite.exe
windows7-x64
10avsuite.exe
windows10-2004-x64
3htmlayout.dll
windows7-x64
1htmlayout.dll
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
f154c92cb4e9af2c71399ad3a290a0a7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f154c92cb4e9af2c71399ad3a290a0a7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
avsuite.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
avsuite.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
htmlayout.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
htmlayout.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20241007-en
General
-
Target
uninstall.exe
-
Size
41KB
-
MD5
f2656f62f52556cbaa8fe63cc51c5d73
-
SHA1
e1cc49f855bb98996ab49caac77cd015569ac024
-
SHA256
2e100548df26b77c4bf3a930023daf36173a04b8242fd7d0f7132e352931e4d2
-
SHA512
e766a0734178530268671432fdcddf22d9913f1eabe964af48d7630dd0a3a8fb9613ea7b3f6ffe9fb3568889d954d2f20c865a0163344cdb55e7419402a0dd1d
-
SSDEEP
768:6HJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJdJRnSlC9ZnOlb2:6pgpHzb9dZVX9fHMvG0D3XJYlC+Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2940 uninstall.exe 2176 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avsuite.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral11/files/0x0014000000018657-2.dat nsis_installer_1 behavioral11/files/0x0014000000018657-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2176 2940 uninstall.exe 30 PID 2940 wrote to memory of 2176 2940 uninstall.exe 30 PID 2940 wrote to memory of 2176 2940 uninstall.exe 30 PID 2940 wrote to memory of 2176 2940 uninstall.exe 30 PID 2176 wrote to memory of 2240 2176 Au_.exe 32 PID 2176 wrote to memory of 2240 2176 Au_.exe 32 PID 2176 wrote to memory of 2240 2176 Au_.exe 32 PID 2176 wrote to memory of 2240 2176 Au_.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\avsuite.exe"C:\Users\Admin\AppData\Local\Temp\avsuite.exe" /terminate3⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD544a2b5a5576a107e5b7da70147f30475
SHA18d243e67374ee2c33e126ead765158a23fd5a813
SHA25699eb9b2619258157be9115700691d441c847df621e871a4deb18a16be4013715
SHA512a5fe6b455cfd4418b8daaa32d711e82bf1e1570822771baced44e7818594c3246504d2068e313d88eb3569996b8c676d6c74325be4a193c81c379dd49b4dc26c
-
Filesize
10KB
MD5055f4f9260e07fc83f71877cbb7f4fad
SHA1a245131af1a182de99bd74af9ff1fab17977a72f
SHA2564209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc
SHA512a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26
-
Filesize
41KB
MD5f2656f62f52556cbaa8fe63cc51c5d73
SHA1e1cc49f855bb98996ab49caac77cd015569ac024
SHA2562e100548df26b77c4bf3a930023daf36173a04b8242fd7d0f7132e352931e4d2
SHA512e766a0734178530268671432fdcddf22d9913f1eabe964af48d7630dd0a3a8fb9613ea7b3f6ffe9fb3568889d954d2f20c865a0163344cdb55e7419402a0dd1d