Overview
overview
7Static
static
3JaffaCakes...04.exe
windows7-x64
7JaffaCakes...04.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...c3.dll
windows7-x64
3$PLUGINSDI...c3.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...st.exe
windows7-x64
7$PROGRAMFI...st.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e25e2c5f4d64bd667c2d067824ec6d04.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e25e2c5f4d64bd667c2d067824ec6d04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/EBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/EBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc3.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/linker.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/linker.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/1ClickDownload/$PROGRAMFILES/1ClickDownload/uninst.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/1ClickDownload/$PROGRAMFILES/1ClickDownload/uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
$PROGRAMFILES/1ClickDownload/$PROGRAMFILES/1ClickDownload/uninst.exe
-
Size
46KB
-
MD5
5e73e30ab261dc9b9ffaa04e3ba66905
-
SHA1
ae169930b35c24c52050da38f82e957d74400ba7
-
SHA256
e41bb8f876079b0c042aa105e799d5fd06d3449ce1408e468d3a16e3f4d4e5ea
-
SHA512
8fc7d1f6978b9fcf503adfc18edbb8958a28aa607685638adff2798c04ebe1ee39d6af0c0a226a21681b8ef8d6a45ce61549648fea2b4253b13273ff3e71d3c2
-
SSDEEP
768:/4wO7XBz+5Qm3W0tYdrQZHV4EWuWEUOg4jjfS3XJ6gd2iZQAm6kRRS+NoJRnMtAE:gLXB65939tY6HBg4sXJ6gdLeAyNDt1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4708 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral16/files/0x0007000000023cc0-3.dat nsis_installer_1 behavioral16/files/0x0007000000023cc0-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4708 1776 uninst.exe 83 PID 1776 wrote to memory of 4708 1776 uninst.exe 83 PID 1776 wrote to memory of 4708 1776 uninst.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\1ClickDownload\$PROGRAMFILES\1ClickDownload\uninst.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\1ClickDownload\$PROGRAMFILES\1ClickDownload\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\1ClickDownload\$PROGRAMFILES\1ClickDownload\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD55e73e30ab261dc9b9ffaa04e3ba66905
SHA1ae169930b35c24c52050da38f82e957d74400ba7
SHA256e41bb8f876079b0c042aa105e799d5fd06d3449ce1408e468d3a16e3f4d4e5ea
SHA5128fc7d1f6978b9fcf503adfc18edbb8958a28aa607685638adff2798c04ebe1ee39d6af0c0a226a21681b8ef8d6a45ce61549648fea2b4253b13273ff3e71d3c2