Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 22:18

General

  • Target

    03c0939221cc821ef6e2c3aba337b6b3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    03c0939221cc821ef6e2c3aba337b6b3

  • SHA1

    8aa2dcf1b9fa074a4768b1e8f4cf8549cd23d574

  • SHA256

    9c633bf015525e859c9eda2f617c57e186621a1aaf8425bc8b3957699fe3dcff

  • SHA512

    199ef1ce49d1e1a7d2763d767d8463c0625bf402e70c53f9210259605c887edc943813c408d260c0d71dfeaaabc0c98ed253dfab7e8ac31788e85880073dbc5b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5a

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c0939221cc821ef6e2c3aba337b6b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03c0939221cc821ef6e2c3aba337b6b3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\ovodflglrl.exe
      ovodflglrl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\SysWOW64\ebaqzlou.exe
        C:\Windows\system32\ebaqzlou.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2196
    • C:\Windows\SysWOW64\albxugrxsnbghqo.exe
      albxugrxsnbghqo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c hifpbxqflhrcc.exe
        3⤵
          PID:2644
      • C:\Windows\SysWOW64\ebaqzlou.exe
        ebaqzlou.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2652
      • C:\Windows\SysWOW64\hifpbxqflhrcc.exe
        hifpbxqflhrcc.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1932
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:2384

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Privilege Escalation

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Defense Evasion

      Hide Artifacts

      2
      T1564

      Hidden Files and Directories

      2
      T1564.001

      Modify Registry

      7
      T1112

      Impair Defenses

      2
      T1562

      Disable or Modify Tools

      2
      T1562.001

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe
        Filesize

        512KB

        MD5

        3e9a917cb2b67307181264ffc21e3469

        SHA1

        cc4048138f4d5d5a20cd07fa131e18c0b3287573

        SHA256

        3b10deefb0e9e863f4f03e241bcd17f9870233821716c863b953aac7451989c7

        SHA512

        d5cf2df10ae18a854a661445ecb5dec57802c8f129aeb0035c8bebc5e1dea9697481f3fb185b968ad0eff08e098563a059c12679745d533c80d9be8af6fc4206

      • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe
        Filesize

        512KB

        MD5

        fec38c4dafa238586ab8aa16994d892a

        SHA1

        41577d3446a9ac823fa44c08912eda416f9edf2c

        SHA256

        071586b9857dce0eda62c5130acb5e5933b9b58d790143f1c272f78198884e56

        SHA512

        72f58805877a356358343a48a780a66d55e6813e075c91f1d37765d348254d702622262f888e44c78534ae6e598cd2eeb49dfa1324952bd49faf2a484eceffa3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        d6670a55e5ce9b4b42806df4fd429c09

        SHA1

        e6eec4fd241cd604d122066423fa2482c663bbe5

        SHA256

        cb4cddab1012326dc0c1dc2076f3e5b7e1f29d85f49c8bcc99a17aab1fbe056d

        SHA512

        5bb90d19cddf04a02a783f8024a99450018758610701fdebf8f6fca3b3c1e6dc90f5cf44a9047c962b14406f7cbddb216b0c5374803d582de3a9d566b943d246

      • C:\Users\Admin\Documents\ConfirmCheckpoint.doc.exe
        Filesize

        512KB

        MD5

        3ee8a9d26375902a78e247a4e6a66d2e

        SHA1

        f807850f79faac6eb07fb20d93b68d73a6fb628a

        SHA256

        c2e5fa9b4b1f234d8701bda33da4d716bb9eeacd552f64360dc40034557910ca

        SHA512

        a257265b7f0b3bc4d5e856163f178280b469053dbcfcee4fa45aad68914bd91137eaea0e0b44f2b01c80798e6eb4a825916f1d1f1e98a802260a504d34670dd8

      • C:\Windows\SysWOW64\albxugrxsnbghqo.exe
        Filesize

        512KB

        MD5

        5acaea5acb7ea3a6b27593a3dbc3ed45

        SHA1

        79422215d0aae6e6806e491344242976a7d4c00e

        SHA256

        2c19cedf691b80a2c52abbe33ac11f7dba508f1a4cb088a5ea6f68fa10e5a587

        SHA512

        7d1ba21de21869831070624d584371da7eb1087a4600cede3dbb30df6e771abfb4627dcec4fdc132b4480e24da81d5083284fc369ad0b907d930a2a9f0cce9f1

      • C:\Windows\SysWOW64\ebaqzlou.exe
        Filesize

        512KB

        MD5

        55f0b1dddc90aaaa20c55ef81308b555

        SHA1

        7ce0eab345b6688a3d80559ab9b8d8f88f1102bb

        SHA256

        f548ff11a6e0b1dd9d6bdc16c1217ed4fe28744f40bbd3700751370c0bd58cb6

        SHA512

        86c68207179b346839ba7a9fd130aa67247a6cbcb5016feb0e1a538fafcfdf0f1e722ee2c5a39de9fe0a5be37907973ff7445ee71447d43c623b8f61efd9bb16

      • C:\Windows\SysWOW64\hifpbxqflhrcc.exe
        Filesize

        512KB

        MD5

        6ef8e66b6f3d00db5dc2ed394c5723e9

        SHA1

        905b27a4292ca48e2f900f7f7a0b03c7b9ab2a8a

        SHA256

        702890c3825f7bb760ec19c8900d5c512b1ed91b0fdadb5d0d78e56c84e0d072

        SHA512

        b27ef3713fe8d374b0e37d4c2917a08cf47d59d0f4cc07ac930e097d85251210f3e79d09f2136b751618a4faf69055e4dfc2939fdb0fc373a0097c00240fdafe

      • C:\Windows\mydoc.rtf
        Filesize

        223B

        MD5

        06604e5941c126e2e7be02c5cd9f62ec

        SHA1

        4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

        SHA256

        85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

        SHA512

        803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

      • \??\c:\Users\Admin\Downloads\SetCompare.doc.exe
        Filesize

        512KB

        MD5

        ec9480cc145468daece0be12d7d6a613

        SHA1

        c1d181ea7064a16644fe5399146b38cab6d83b12

        SHA256

        0d8a8e1ced38e9a35d44a865befa1e934549084b9cf0bd0780e53de3e7d77671

        SHA512

        bb0388e56351921a1a044cbec0812950e07d444d8c646052373b6ad584394a2fbf7d1a9c5c9b1542f167820dd43422dc7fbf98e6513fe9ca04640d82e7cb1479

      • \Windows\SysWOW64\ovodflglrl.exe
        Filesize

        512KB

        MD5

        6c77a5c0f11bd763091ab66cd7b00139

        SHA1

        8b0aa9a9726e1921d6a520cac991a69389a5b5e3

        SHA256

        cde88d101ba5105948ec844275d59f0b286f38922e5a1038eba1e343e3a0a146

        SHA512

        414ca68c8d4cc4a73722b9ca11e11bc242c555956981a958818ab659105ecf424f1ecff65f724c9a2863fa3e4f6b32f7b322cdc2da04f5a4b9dc9ce56832a724

      • memory/2380-0-0x0000000000400000-0x0000000000496000-memory.dmp
        Filesize

        600KB

      • memory/2852-45-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2852-108-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB