Analysis

  • max time kernel
    145s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 09:20

General

  • Target

    aeac60242aa50b684ee442a3a6ab6ba6_JaffaCakes118.exe

  • Size

    646KB

  • MD5

    aeac60242aa50b684ee442a3a6ab6ba6

  • SHA1

    d51ab9f1434734352e0baa232f3620f6680ce24c

  • SHA256

    22a7a589ea5387396db7354ac92a32119e03c00846e84455ec70fd1a286a6962

  • SHA512

    8b91fdaf4a2d7d77fb1e10d99905805795163327b2054252263b416f79bd5705ef614a77ce4c3287d0c81f99378a1a217c50c0029f8ee0948d05bfb64979c1c7

  • SSDEEP

    12288:WuDa9X5y8J//i+w02KSpovfpVMHIJBNNTvqYfewyotQgWP:WWc59XiMvLrTbGwyE+P

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aeac60242aa50b684ee442a3a6ab6ba6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aeac60242aa50b684ee442a3a6ab6ba6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.exe" "C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.dll" -r
      2⤵
      • Executes dropped EXE
      PID:2452
    • C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.exe
      "C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.exe" "C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.dll" Install ""
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2688
  • C:\ProgramData\Wyeke\wyeke135.exe
    "C:\ProgramData\Wyeke\wyeke135.exe" "C:\Program Files (x86)\Wyeke\wyeke.dll" Service
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Program Files (x86)\Wyeke\wyeke.exe
      "C:\Program Files (x86)\Wyeke\wyeke.exe" "C:\Program Files (x86)\Wyeke\wyeke.dll" Main
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2500

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\uninstall.exe

          Filesize

          87KB

          MD5

          d445cf2b1abb1e43b5bc15ad8b3ee425

          SHA1

          c32bd43025189c83ffc2d4656c7558b30f623c5a

          SHA256

          7ce4961b1e2246109df696d8479c3b6d41f658010bd4455d3573c5933e189a53

          SHA512

          099f2a0783d9415a3e27d2fdf5af83461327ec80f8d801396be91e4c8546377fd884aad75ce1d80ae490daa3db74f6bd2176b46129b8015583321e4e3bcdb32d

        • C:\Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.dll

          Filesize

          576KB

          MD5

          cc49f5ca2c041dfe9ccf907909409545

          SHA1

          ea775647b76898bf044f8efbefcb5d74367afc2a

          SHA256

          b9f2beaf23e72be09ab3b4f1d4d55bae4142812cea9ebdca5bbed3b031b3f0a0

          SHA512

          47da82e4f3c77702a09c8dd716bd7034a6efbdf63ab79579157e5bd9d9fe4b289cb2897156140f37327a813ae81b95506fa4c2046aeabf9e33cbeaed7443d8f6

        • \Users\Admin\AppData\Local\Temp\nsy4F0C.tmp\wyeke.exe

          Filesize

          45KB

          MD5

          1ad77afb3a6e69b9369d46b66b2d4dd7

          SHA1

          f45d8e761183fae1a7a479b8c9618b40a06a6008

          SHA256

          6826c03be926075bf3ea7503caf5e152d33b224fd82fa87bfd582701a659dbd6

          SHA512

          aded9b92971c26f078ac583667136a811499cac67f44601eda227e98dd096a1cf2245aee98e931b75e5eacaac494f1dbb1217a3e19019d7afc0ba5fd45934926

        • memory/2500-57-0x00000000008C0000-0x0000000000942000-memory.dmp

          Filesize

          520KB

        • memory/2688-24-0x0000000000220000-0x00000000002A2000-memory.dmp

          Filesize

          520KB