Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 21:09

General

  • Target

    ebfecbef6ebe273d0c5bad983b5b7477_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ebfecbef6ebe273d0c5bad983b5b7477

  • SHA1

    2f5f13a0b225c472bc67408160d17165c44a9247

  • SHA256

    2150e17927f0a9c7996df6ab4346f20a8f0951863b49f597b190d02e294a0f87

  • SHA512

    3efeb44882f2f7a99b33862216a3c8ca2bc08a51206d6c75edb7c1368db593c488c87ccc5a5a5ca52c032eb8e4da3761301de9b60058e2d60afd40276e93adec

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5V

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebfecbef6ebe273d0c5bad983b5b7477_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebfecbef6ebe273d0c5bad983b5b7477_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\uwakppsjoj.exe
      uwakppsjoj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\erppidyv.exe
        C:\Windows\system32\erppidyv.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1776
    • C:\Windows\SysWOW64\ybzuvtrhzvomjda.exe
      ybzuvtrhzvomjda.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2628
    • C:\Windows\SysWOW64\erppidyv.exe
      erppidyv.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4628
    • C:\Windows\SysWOW64\nycbuahyeomti.exe
      nycbuahyeomti.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4272
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    45a7f45c900d5e9062b7ecb98c5b63b0

    SHA1

    60961b3222e11bf17e08f164b0fdba0df15376fc

    SHA256

    4dba6fed3311e81671c474c56211ab96b8045702e974f302b5935b2a442b404a

    SHA512

    038def34daba3d252ea55ec89e90e40adb593ed3088c86afe17bb14d6342795ab3eae377e26496d3601cbf1f7900f0d8678de1e4865d3ece5e48e7af913183d0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c594636eeb6771f8bdc08d2882d87ef0

    SHA1

    c62485ff37422c34b9df449f2d7a858fa080a3bd

    SHA256

    fe2639361a36643b5ee5a2f7f78d146c2aaec50d03434b9cb39c2df10bd21927

    SHA512

    44b081a386125d9a626bb241d22e0f4f645d089ed513ed10bee4ba8c178871d3ba868ff9416077ad3a6b387984a594a9c52aa96e6c8bb39542ebb6fa64a5d948

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a72fb37b6d45ca12542115294b8c75cc

    SHA1

    5589d41b74acecbccb0e5914385d6af45c3fd712

    SHA256

    83e239733df571fc60fc9c7d6cec8bb82e6795b0520b95f4cd11f296f66a9b49

    SHA512

    1461d6520547262c2d61d795c832290361c4992b868e9e26ae4455f9cfefdb7614604f6a19e9c67700a02012b7b3232847aa032a006de1858a013597a444cc6d

  • C:\Users\Admin\AppData\Roaming\UnregisterDisable.doc.exe

    Filesize

    512KB

    MD5

    e879c9fe5e313fc69d73882853344886

    SHA1

    7ff6c92ae605562443f8b8fc3b33fb317a7cee1d

    SHA256

    ca0e4009c488dc2a27837f6f65c97334f388507c228497ce4daedd91816a653a

    SHA512

    d0c38ee4c260482fdf6308ad659d364b5dbf8bfc38ce9fd1bd4aa52481c739142ed079eab8e79e8a161c0ae6d68df390118089752d73f07f639805c32a1cb41a

  • C:\Windows\SysWOW64\erppidyv.exe

    Filesize

    512KB

    MD5

    dfee6b0fc6ff5977978816a71afe75eb

    SHA1

    ad7887034188b6ac1e118e5a7dd39fd839bccb82

    SHA256

    666ec5cf97f58a450408cbbf364ee504bc019cee9e397768b691117c5b18d624

    SHA512

    3d19a331564cf27e5f14c3b93dab7cd3cd97a0290c094bf2d9f4cd85078bf883197a8e4a038ea81e031f3ebf32d89c7c349365ece4bd2e81548a2fe783181ebf

  • C:\Windows\SysWOW64\nycbuahyeomti.exe

    Filesize

    512KB

    MD5

    d8b3a7cd0e8711dad9250532842d8d63

    SHA1

    685f20712d5aedbe167cdc3f65391e3c7df859c4

    SHA256

    82d11cc1bb6394910bd6eeddd922be1fe2204301f401bb4e3f6108e40517d2c6

    SHA512

    f7f7595e72059843d5df1870b663f3d6069e7a65447f8ff33d9d02bd0229889c6a78be0ca53b2826efd85e1c5aebf3f6bc3c886b9d9fb1d0cd888019729ab171

  • C:\Windows\SysWOW64\uwakppsjoj.exe

    Filesize

    512KB

    MD5

    d9484d1da4c6292ca877ac700b5d2830

    SHA1

    47d6857679ba19fd0d1024eeccc7ab01a4599754

    SHA256

    d11c6056ccaebca519691a10eefd1c09226e587500f007f0bf11c507cb611698

    SHA512

    3795fc80418f181d124e5781c9fbd0e4d7ef6654ecbad0e50caa87218166064f282d085842f405ce6403c964613cc0801c69220a0545617d7c3540843965938e

  • C:\Windows\SysWOW64\ybzuvtrhzvomjda.exe

    Filesize

    512KB

    MD5

    d85a7437d350657560dea0878a4d6562

    SHA1

    0bd6a8c57a25b7aa442043f59b288c0622157dc5

    SHA256

    bc038a62a1168c5fc4bcbd09127d0d2e557d9e214f577c2d955a3c19b3f501e7

    SHA512

    6e9e51b93afe1dd21c0a5cf1020db944f916aeed5efed96b00b57b253d62618a5bed6bad75248ab6adddbd5a45bc18570267208213b8cbedf1c7d8b3b551f1d1

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    2dd6240e701d1b6426b9aef7ca1077f1

    SHA1

    6c2ef3b42b0232b26a50404c4a3808619105430c

    SHA256

    5bca0aa582aca70a518cb4612447dbb85ede8c362655ba363c1d03a9add4ef86

    SHA512

    1e303dcd83a75941b6d699b71b6edafa70d5aa7b103f6597f5a23aa28a173e7331b2fc3e346c7feb73fb1707420880df43948d83746c5839a4a605c59a81f5f9

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    70740202bd44bb0dad865fcc4d1c457c

    SHA1

    cc5cfcd2f2082cfe63c3418344534e95809ad9f8

    SHA256

    651ebf4a504d2a5fdd7f6b12ce3774119c59f8519e19a168af246b4b055d2c67

    SHA512

    e05a6752075110b10f56c4de05917a2064aa0d2d8ed2b130660d988a85df1a26f3cfa70d613fae8c17c5849f8f388f9bce77ed4c1a65e47e0610bf27276ff70d

  • memory/2176-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4972-39-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-43-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-47-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-48-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-50-0x00007FF9D6BB0000-0x00007FF9D6BC0000-memory.dmp

    Filesize

    64KB

  • memory/4972-49-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-51-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-52-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-53-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-42-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-64-0x00007FF9D6BB0000-0x00007FF9D6BC0000-memory.dmp

    Filesize

    64KB

  • memory/4972-46-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-41-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-40-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-38-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-37-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-36-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-35-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-114-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB

  • memory/4972-136-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-137-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-138-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-139-0x00007FF9D9210000-0x00007FF9D9220000-memory.dmp

    Filesize

    64KB

  • memory/4972-140-0x00007FFA19190000-0x00007FFA19385000-memory.dmp

    Filesize

    2.0MB