Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 06:11

General

  • Target

    f2dd17be562557a280ce357c8045e377_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    f2dd17be562557a280ce357c8045e377

  • SHA1

    42f9d4f60d1bac9fbac8d092490817155494d74a

  • SHA256

    93351318ef6eaaaaf7ec64816998c22101bd7666a950442029af6a93a0ab800e

  • SHA512

    9616fd627fd3c0fb15577a74c970b6d13459d3a070741a35f721516072aa581f3098b426cd051531c8b93bbb9d79426964b4c3e67db518848d0d085fd16f764c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6j:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5C

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2dd17be562557a280ce357c8045e377_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f2dd17be562557a280ce357c8045e377_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\SysWOW64\bjimdrzpnk.exe
      bjimdrzpnk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SysWOW64\xpprznem.exe
        C:\Windows\system32\xpprznem.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2456
    • C:\Windows\SysWOW64\tjnmpbtaoxbyesj.exe
      tjnmpbtaoxbyesj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2648
    • C:\Windows\SysWOW64\xpprznem.exe
      xpprznem.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2408
    • C:\Windows\SysWOW64\ghwytvirqcxli.exe
      ghwytvirqcxli.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2560
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2452
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          2ba56ff5d033ce2cd4ba4492dccf9111

          SHA1

          b204dac6e1c978b0bf53fc0e321fd959037dccd8

          SHA256

          1c46a48a69861d1808dbfdd4c5e0e9bfa8406cbbc00887d82ba78cdf5a9d615a

          SHA512

          e559af6d70ff375058e8c424a41fb85794d1a96ec2e768ef0eaeea0a299eb3a68541e575c8c98288f23be93c905bc5e6c812860b348ac1c110541b4f5579f9a8

        • C:\Windows\SysWOW64\ghwytvirqcxli.exe

          Filesize

          512KB

          MD5

          14b5baf08d2141dc3914dea2723a506b

          SHA1

          6a69d91f087d1dcab8b0b97ee68fb177128a6996

          SHA256

          7b56ed65530f61d2c38f22a0e8f466ea3306365cf90013df0bee776796889655

          SHA512

          7f42e99e85278df9dade6a1550f70d8c2de5e24031f84a6643b0aade6c3ebda29ca14991a8f5c5cfadd7a2ab3a9d7400d5b12789982d59c62e2ab384f1432834

        • C:\Windows\SysWOW64\tjnmpbtaoxbyesj.exe

          Filesize

          512KB

          MD5

          6d68dd04194d72cd20d2eb69787600d1

          SHA1

          a49b390e49738a2d51bf03a2be592cc18e497d16

          SHA256

          7284ef0426ae143f0e0ac5f3c0c8ca38fedfc5b70148c66ed061ff9324490f9e

          SHA512

          57a1b4a08123af0aef854b7bc005198fef96b40023e028556ecb72cf3b1c75971f57fca963ca211848a15da2a8d5298d622ccd22a332a80069addaea1ba2d4d6

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \Windows\SysWOW64\bjimdrzpnk.exe

          Filesize

          512KB

          MD5

          ac723e7abffe0fcfedf0b42f9d89fb51

          SHA1

          6e1a88c9b540e879a7d38d2b6b5ac4bf76f19fe5

          SHA256

          3aab3130f885d196463a1a0d56b8192d60cc0d3d755b5714291bf4c6c29979c6

          SHA512

          372fc0efaac74ed82dc48a37e8df37604484ed891ed45a0556926acc1752dabb0bef747f1f5a306a209c99cb28d44241cb0cd6a7467542c6c7cc5c9af9294459

        • \Windows\SysWOW64\xpprznem.exe

          Filesize

          512KB

          MD5

          f211893aea7b91338336be6a02e8a81b

          SHA1

          6b69a52fdc436c3e72842fa9b09a220bd1d58b51

          SHA256

          6d399b401446f763127d5faf3217e3431611c896558eece137d0be31b61b2a23

          SHA512

          e56c014a9a013c4616a2a4fb64fcf7455ae396cc7b5ca7cb0938259671d48d11cd116a09a409b8e826f1a0f0a18c88d8ea2fc32227d123b7e05dfd412c885165

        • memory/1516-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2008-75-0x0000000004450000-0x0000000004451000-memory.dmp

          Filesize

          4KB

        • memory/2008-78-0x0000000004450000-0x0000000004451000-memory.dmp

          Filesize

          4KB

        • memory/2008-83-0x0000000002B20000-0x0000000002B30000-memory.dmp

          Filesize

          64KB

        • memory/2452-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2452-47-0x000000007156D000-0x0000000071578000-memory.dmp

          Filesize

          44KB

        • memory/2452-45-0x000000002F8A1000-0x000000002F8A2000-memory.dmp

          Filesize

          4KB

        • memory/2452-76-0x000000007156D000-0x0000000071578000-memory.dmp

          Filesize

          44KB