Overview
overview
10Static
static
10JaffaCakes...63.exe
windows10-2004-x64
10JaffaCakes...63.exe
windows11-21h2-x64
10$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3AKL.chm
windows10-2004-x64
1AKL.chm
windows11-21h2-x64
1AKL.exe
windows10-2004-x64
6AKL.exe
windows11-21h2-x64
6AKV.exe
windows10-2004-x64
3AKV.exe
windows11-21h2-x64
3Uninstall.exe
windows10-2004-x64
7Uninstall.exe
windows11-21h2-x64
7il.dll
windows10-2004-x64
3il.dll
windows11-21h2-x64
3kh.dll
windows10-2004-x64
3kh.dll
windows11-21h2-x64
3qs.html
windows10-2004-x64
4qs.html
windows11-21h2-x64
7Analysis
-
max time kernel
102s -
max time network
109s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2025, 04:43
Behavioral task
behavioral1
Sample
JaffaCakes118_bca126cc681c07440b291fe71f5ab863.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bca126cc681c07440b291fe71f5ab863.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
AKL.chm
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
AKL.chm
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
AKL.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
AKL.exe
Resource
win11-20250411-en
Behavioral task
behavioral9
Sample
AKV.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral10
Sample
AKV.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
Uninstall.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral12
Sample
Uninstall.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
il.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
il.dll
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
kh.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral16
Sample
kh.dll
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
qs.html
Resource
win10v2004-20250410-en
Behavioral task
behavioral18
Sample
qs.html
Resource
win11-20250410-en
General
-
Target
Uninstall.exe
-
Size
43KB
-
MD5
8cd0f4d927e641cf5fdccebfa663b91c
-
SHA1
f19fa54852d1f85a31c5f795ea1cd70846a25c63
-
SHA256
62a47fcf580bc9419df7ac8e7a3d58008f2e6c914e9051db351d4d852e547877
-
SHA512
a1a8e38259ffbf9151adac5b23aab151bbcd726cc2e5a12222c4f2bb97ddb1770409d2170ff835b1b7f627858497c4408abcd68ae34a973d9da25149f04bd727
-
SSDEEP
768:Dh03BWfzcJpdd4jU3eRo8rwV0GfL7rtU7UMt3MBJ7lNT2ANlAArHM:Dh03grsyj5Rk0gtUABJ3Tp3FHM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5308 A~NSISu_.exe -
Executes dropped EXE 1 IoCs
pid Process 5308 A~NSISu_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A~NSISu_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral12/files/0x001200000002ad10-4.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 232 wrote to memory of 5308 232 Uninstall.exe 78 PID 232 wrote to memory of 5308 232 Uninstall.exe 78 PID 232 wrote to memory of 5308 232 Uninstall.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe"C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5308
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD58cd0f4d927e641cf5fdccebfa663b91c
SHA1f19fa54852d1f85a31c5f795ea1cd70846a25c63
SHA25662a47fcf580bc9419df7ac8e7a3d58008f2e6c914e9051db351d4d852e547877
SHA512a1a8e38259ffbf9151adac5b23aab151bbcd726cc2e5a12222c4f2bb97ddb1770409d2170ff835b1b7f627858497c4408abcd68ae34a973d9da25149f04bd727