Overview
overview
7Static
static
3JaffaCakes...04.exe
windows7-x64
7JaffaCakes...04.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...c3.dll
windows7-x64
3$PLUGINSDI...c3.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...st.exe
windows7-x64
7$PROGRAMFI...st.exe
windows10-2004-x64
7Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e25e2c5f4d64bd667c2d067824ec6d04.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e25e2c5f4d64bd667c2d067824ec6d04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/EBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/EBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc3.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/linker.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/linker.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/1ClickDownload/$PROGRAMFILES/1ClickDownload/uninst.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/1ClickDownload/$PROGRAMFILES/1ClickDownload/uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
$PROGRAMFILES/1ClickDownload/$PROGRAMFILES/1ClickDownload/uninst.exe
-
Size
46KB
-
MD5
5e73e30ab261dc9b9ffaa04e3ba66905
-
SHA1
ae169930b35c24c52050da38f82e957d74400ba7
-
SHA256
e41bb8f876079b0c042aa105e799d5fd06d3449ce1408e468d3a16e3f4d4e5ea
-
SHA512
8fc7d1f6978b9fcf503adfc18edbb8958a28aa607685638adff2798c04ebe1ee39d6af0c0a226a21681b8ef8d6a45ce61549648fea2b4253b13273ff3e71d3c2
-
SSDEEP
768:/4wO7XBz+5Qm3W0tYdrQZHV4EWuWEUOg4jjfS3XJ6gd2iZQAm6kRRS+NoJRnMtAE:gLXB65939tY6HBg4sXJ6gdLeAyNDt1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 636 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 uninst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral15/files/0x00100000000162e9-2.dat nsis_installer_1 behavioral15/files/0x00100000000162e9-2.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 636 2396 uninst.exe 29 PID 2396 wrote to memory of 636 2396 uninst.exe 29 PID 2396 wrote to memory of 636 2396 uninst.exe 29 PID 2396 wrote to memory of 636 2396 uninst.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\1ClickDownload\$PROGRAMFILES\1ClickDownload\uninst.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\1ClickDownload\$PROGRAMFILES\1ClickDownload\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\1ClickDownload\$PROGRAMFILES\1ClickDownload\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD55e73e30ab261dc9b9ffaa04e3ba66905
SHA1ae169930b35c24c52050da38f82e957d74400ba7
SHA256e41bb8f876079b0c042aa105e799d5fd06d3449ce1408e468d3a16e3f4d4e5ea
SHA5128fc7d1f6978b9fcf503adfc18edbb8958a28aa607685638adff2798c04ebe1ee39d6af0c0a226a21681b8ef8d6a45ce61549648fea2b4253b13273ff3e71d3c2