Analysis
-
max time kernel
104s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9a5e537d9eea6f0e26eedc68fa240ec4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
$PROGRAMFILES/$0/Uninstall.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
cmtowgosvx.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral6
Sample
imex.bat
Resource
win10v2004-20250313-en
General
-
Target
$PROGRAMFILES/$0/Uninstall.exe
-
Size
39KB
-
MD5
b00d9555beebee772ff76df77cee661c
-
SHA1
7d0c978469a6eed6259f6fdb274ecdab738c809d
-
SHA256
566ab6e2b892c0a95e9957df7bfae01971daaecb95cfc254dfdac956ada8cdc1
-
SHA512
832d95c3983e0db2c87581f9f5bdb73080fa78d56f6e00c46e1ae6fd5c70a0f2a48a0f3eb91d184baeb7eb3a47580f67aafe769dee37bcd90f0c24a6fcead1be
-
SSDEEP
768:r/gUpAudwtjpQaCyMRiNH/buv1dTm61pF/O71mJEbOTVbcDoCdii:kUiudwBp3CyM8HsWmJ4OTVQBdii
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4108 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4108 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral4/files/0x00070000000240ca-4.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4712 wrote to memory of 4108 4712 Uninstall.exe 87 PID 4712 wrote to memory of 4108 4712 Uninstall.exe 87 PID 4712 wrote to memory of 4108 4712 Uninstall.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\$0\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5b00d9555beebee772ff76df77cee661c
SHA17d0c978469a6eed6259f6fdb274ecdab738c809d
SHA256566ab6e2b892c0a95e9957df7bfae01971daaecb95cfc254dfdac956ada8cdc1
SHA512832d95c3983e0db2c87581f9f5bdb73080fa78d56f6e00c46e1ae6fd5c70a0f2a48a0f3eb91d184baeb7eb3a47580f67aafe769dee37bcd90f0c24a6fcead1be