Overview
overview
10Static
static
3JaffaCakes...d8.exe
windows7-x64
7JaffaCakes...d8.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3AIPR.exe
windows7-x64
10AIPR.exe
windows10-2004-x64
10aipr.chm
windows7-x64
1aipr.chm
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 11:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AIPR.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AIPR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
aipr.chm
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
aipr.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
uninst.exe
-
Size
35KB
-
MD5
9331b82efd50c1085b8b01a34a4ff6ff
-
SHA1
de8d2e8dff020e724171c08ddaaff1554ab404c1
-
SHA256
f5ff33f631031a3995edad59bed55902032192c65ea3d6123ed47ea60fcee4f4
-
SHA512
e00ee2395e8cb48c7554c604a14f1cdf9830d3930c580c0d482e7bc965f953828383e182b86a06263f1946883e6d8ec6f52199218bba22cbb8b06e2309d098ce
-
SSDEEP
768:ZFe0D3XjRal6bOS90v2iMrTxRX0I666Sr2ZvMjBtL3MBJREAMa:Te0DnjRrJav2FnUIRr2vMYBJREAJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1772 A~NSISu_.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 A~NSISu_.exe -
Loads dropped DLL 4 IoCs
pid Process 2680 uninst.exe 1772 A~NSISu_.exe 1772 A~NSISu_.exe 1772 A~NSISu_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral11/files/0x000b0000000120d6-2.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1772 2680 uninst.exe 30 PID 2680 wrote to memory of 1772 2680 uninst.exe 30 PID 2680 wrote to memory of 1772 2680 uninst.exe 30 PID 2680 wrote to memory of 1772 2680 uninst.exe 30 PID 2680 wrote to memory of 1772 2680 uninst.exe 30 PID 2680 wrote to memory of 1772 2680 uninst.exe 30 PID 2680 wrote to memory of 1772 2680 uninst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59331b82efd50c1085b8b01a34a4ff6ff
SHA1de8d2e8dff020e724171c08ddaaff1554ab404c1
SHA256f5ff33f631031a3995edad59bed55902032192c65ea3d6123ed47ea60fcee4f4
SHA512e00ee2395e8cb48c7554c604a14f1cdf9830d3930c580c0d482e7bc965f953828383e182b86a06263f1946883e6d8ec6f52199218bba22cbb8b06e2309d098ce