Overview
overview
7Static
static
3aeac60242a...18.exe
windows7-x64
7aeac60242a...18.exe
windows10-2004-x64
7$0/uninstall.exe
windows7-x64
7$0/uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$0/wyeke.dll
windows7-x64
3$0/wyeke.dll
windows10-2004-x64
3$0/wyeke.exe
windows7-x64
1$0/wyeke.exe
windows10-2004-x64
3Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
aeac60242aa50b684ee442a3a6ab6ba6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aeac60242aa50b684ee442a3a6ab6ba6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0/uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$0/uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$0/wyeke.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$0/wyeke.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$0/wyeke.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$0/wyeke.exe
Resource
win10v2004-20240802-en
General
-
Target
$0/uninstall.exe
-
Size
87KB
-
MD5
d445cf2b1abb1e43b5bc15ad8b3ee425
-
SHA1
c32bd43025189c83ffc2d4656c7558b30f623c5a
-
SHA256
7ce4961b1e2246109df696d8479c3b6d41f658010bd4455d3573c5933e189a53
-
SHA512
099f2a0783d9415a3e27d2fdf5af83461327ec80f8d801396be91e4c8546377fd884aad75ce1d80ae490daa3db74f6bd2176b46129b8015583321e4e3bcdb32d
-
SSDEEP
1536:nEkjY1zy214Qay0DGkJbvPJDtimfOPcucp17GP/W8eptep2/DyQM:EkjAJ4dDGkJzniUT3OPebp0o/Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 1172 Au_.exe 1172 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral4/files/0x000700000002349f-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1172 1932 uninstall.exe 86 PID 1932 wrote to memory of 1172 1932 uninstall.exe 86 PID 1932 wrote to memory of 1172 1932 uninstall.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\$0\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$0\uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$0\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5d765c492c21689e3d9d61634371fd861
SHA1ac200933671ae52c9d5544d0e2e8e9144d286c83
SHA256551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc
SHA5129919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f
-
Filesize
10KB
MD5fe24766ba314f620d57d0cf7339103c0
SHA18641545f03f03ff07485d6ec4d7b41cbb898c269
SHA256802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd
SHA51260d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3
-
Filesize
598B
MD55371aa481e35858e1ef9e60e8649ea8f
SHA11c8f19d998b5fc2a4790bbc68ce2e9e2c68e5e17
SHA25606ea41a9b26a82b053bc56cf703149ea97b26f101f2826b611c0548132a3b2a3
SHA5124945c31f2096e04d3b3916190120aa8057d2e659cce1eacc60ad54e2d9d5b4ec7db560df0699f9926014192d6ba6714ec6e18aec88c72dd3fd0ebceb7ff9c33d
-
Filesize
87KB
MD5d445cf2b1abb1e43b5bc15ad8b3ee425
SHA1c32bd43025189c83ffc2d4656c7558b30f623c5a
SHA2567ce4961b1e2246109df696d8479c3b6d41f658010bd4455d3573c5933e189a53
SHA512099f2a0783d9415a3e27d2fdf5af83461327ec80f8d801396be91e4c8546377fd884aad75ce1d80ae490daa3db74f6bd2176b46129b8015583321e4e3bcdb32d