Analysis
-
max time kernel
153s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe
-
Size
512KB
-
MD5
f5441e675d9e0e6453ec9ecf8cfe8bea
-
SHA1
095dd32280f4fb97e439ffc551bcd2ffc3f0a050
-
SHA256
82d8f7e5b4df88d9743b8ca4a1f2a5473eba9c85316819009be8738be98d8834
-
SHA512
f26d14ba0c514d14c9e2ec800e1b5a7c91027a034dd13e51cd5b0eb961ccd6244b38e8b9cc95d8fec83277250cfdc4ae96ea8d04cae80d8d32da5cd56e546700
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6r:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rarfvdlexl.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rarfvdlexl.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rarfvdlexl.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rarfvdlexl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 2740 rarfvdlexl.exe 3464 iwzcymgkuefsstq.exe 5108 lecijxna.exe 4744 blnykhrqzpyab.exe 4500 lecijxna.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rarfvdlexl.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "blnykhrqzpyab.exe" iwzcymgkuefsstq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\toogaovx = "rarfvdlexl.exe" iwzcymgkuefsstq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jkwhzuhv = "iwzcymgkuefsstq.exe" iwzcymgkuefsstq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: lecijxna.exe File opened (read-only) \??\z: lecijxna.exe File opened (read-only) \??\b: rarfvdlexl.exe File opened (read-only) \??\v: rarfvdlexl.exe File opened (read-only) \??\z: rarfvdlexl.exe File opened (read-only) \??\g: lecijxna.exe File opened (read-only) \??\i: lecijxna.exe File opened (read-only) \??\s: lecijxna.exe File opened (read-only) \??\k: rarfvdlexl.exe File opened (read-only) \??\l: rarfvdlexl.exe File opened (read-only) \??\t: rarfvdlexl.exe File opened (read-only) \??\e: lecijxna.exe File opened (read-only) \??\e: rarfvdlexl.exe File opened (read-only) \??\n: rarfvdlexl.exe File opened (read-only) \??\u: rarfvdlexl.exe File opened (read-only) \??\t: lecijxna.exe File opened (read-only) \??\l: lecijxna.exe File opened (read-only) \??\u: lecijxna.exe File opened (read-only) \??\j: rarfvdlexl.exe File opened (read-only) \??\p: rarfvdlexl.exe File opened (read-only) \??\s: rarfvdlexl.exe File opened (read-only) \??\k: lecijxna.exe File opened (read-only) \??\y: lecijxna.exe File opened (read-only) \??\a: lecijxna.exe File opened (read-only) \??\h: lecijxna.exe File opened (read-only) \??\j: lecijxna.exe File opened (read-only) \??\m: lecijxna.exe File opened (read-only) \??\o: lecijxna.exe File opened (read-only) \??\g: rarfvdlexl.exe File opened (read-only) \??\q: rarfvdlexl.exe File opened (read-only) \??\r: rarfvdlexl.exe File opened (read-only) \??\o: lecijxna.exe File opened (read-only) \??\s: lecijxna.exe File opened (read-only) \??\p: lecijxna.exe File opened (read-only) \??\n: lecijxna.exe File opened (read-only) \??\q: lecijxna.exe File opened (read-only) \??\w: lecijxna.exe File opened (read-only) \??\i: rarfvdlexl.exe File opened (read-only) \??\x: lecijxna.exe File opened (read-only) \??\h: rarfvdlexl.exe File opened (read-only) \??\o: rarfvdlexl.exe File opened (read-only) \??\b: lecijxna.exe File opened (read-only) \??\e: lecijxna.exe File opened (read-only) \??\v: lecijxna.exe File opened (read-only) \??\y: lecijxna.exe File opened (read-only) \??\v: lecijxna.exe File opened (read-only) \??\x: rarfvdlexl.exe File opened (read-only) \??\y: rarfvdlexl.exe File opened (read-only) \??\z: lecijxna.exe File opened (read-only) \??\g: lecijxna.exe File opened (read-only) \??\i: lecijxna.exe File opened (read-only) \??\k: lecijxna.exe File opened (read-only) \??\w: lecijxna.exe File opened (read-only) \??\m: rarfvdlexl.exe File opened (read-only) \??\m: lecijxna.exe File opened (read-only) \??\q: lecijxna.exe File opened (read-only) \??\u: lecijxna.exe File opened (read-only) \??\r: lecijxna.exe File opened (read-only) \??\x: lecijxna.exe File opened (read-only) \??\a: lecijxna.exe File opened (read-only) \??\r: lecijxna.exe File opened (read-only) \??\t: lecijxna.exe File opened (read-only) \??\a: rarfvdlexl.exe File opened (read-only) \??\p: lecijxna.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rarfvdlexl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rarfvdlexl.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2296-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0008000000023248-5.dat autoit_exe behavioral2/files/0x0008000000023247-17.dat autoit_exe behavioral2/files/0x000800000002324a-26.dat autoit_exe behavioral2/files/0x000800000002324c-31.dat autoit_exe behavioral2/files/0x0004000000022d12-60.dat autoit_exe behavioral2/files/0x0008000000022fec-63.dat autoit_exe behavioral2/files/0x000f00000001e5a3-98.dat autoit_exe behavioral2/files/0x000300000001e5a4-104.dat autoit_exe behavioral2/files/0x000300000000070f-113.dat autoit_exe behavioral2/files/0x000300000000070f-119.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\rarfvdlexl.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rarfvdlexl.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File created C:\Windows\SysWOW64\blnykhrqzpyab.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iwzcymgkuefsstq.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\blnykhrqzpyab.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rarfvdlexl.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lecijxna.exe File created C:\Windows\SysWOW64\iwzcymgkuefsstq.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File created C:\Windows\SysWOW64\lecijxna.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lecijxna.exe f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lecijxna.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lecijxna.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lecijxna.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lecijxna.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lecijxna.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lecijxna.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lecijxna.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lecijxna.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lecijxna.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lecijxna.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lecijxna.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E88FF8B482E82189133D72F7E97BC97E6415847664E633FD7ED" f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rarfvdlexl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F56BC1FE6B21DFD208D0A18B7F9062" f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184AC67A14E5DAB3B9CE7FE1ED9637CF" f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rarfvdlexl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412C799D5283596D4376D470532CDB7C8664AC" f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABCF9CAFE67F1E384793B35869C39E1B38A02F14315023AE2CD459D09D2" f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" rarfvdlexl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc rarfvdlexl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rarfvdlexl.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B12F479439EB53C4B9A1329BD7BC" f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5112 WINWORD.EXE 5112 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4500 lecijxna.exe 4500 lecijxna.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4500 lecijxna.exe 4500 lecijxna.exe 4500 lecijxna.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 2740 rarfvdlexl.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 3464 iwzcymgkuefsstq.exe 5108 lecijxna.exe 5108 lecijxna.exe 5108 lecijxna.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4744 blnykhrqzpyab.exe 4500 lecijxna.exe 4500 lecijxna.exe 4500 lecijxna.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5112 WINWORD.EXE 5112 WINWORD.EXE 5112 WINWORD.EXE 5112 WINWORD.EXE 5112 WINWORD.EXE 5112 WINWORD.EXE 5112 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2740 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 90 PID 2296 wrote to memory of 2740 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 90 PID 2296 wrote to memory of 2740 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 90 PID 2296 wrote to memory of 3464 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 91 PID 2296 wrote to memory of 3464 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 91 PID 2296 wrote to memory of 3464 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 91 PID 2296 wrote to memory of 5108 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 92 PID 2296 wrote to memory of 5108 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 92 PID 2296 wrote to memory of 5108 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 92 PID 2296 wrote to memory of 4744 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 93 PID 2296 wrote to memory of 4744 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 93 PID 2296 wrote to memory of 4744 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 93 PID 2740 wrote to memory of 4500 2740 rarfvdlexl.exe 94 PID 2740 wrote to memory of 4500 2740 rarfvdlexl.exe 94 PID 2740 wrote to memory of 4500 2740 rarfvdlexl.exe 94 PID 2296 wrote to memory of 5112 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 95 PID 2296 wrote to memory of 5112 2296 f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5441e675d9e0e6453ec9ecf8cfe8bea_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\rarfvdlexl.exerarfvdlexl.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\lecijxna.exeC:\Windows\system32\lecijxna.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4500
-
-
-
C:\Windows\SysWOW64\iwzcymgkuefsstq.exeiwzcymgkuefsstq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3464
-
-
C:\Windows\SysWOW64\lecijxna.exelecijxna.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5108
-
-
C:\Windows\SysWOW64\blnykhrqzpyab.exeblnykhrqzpyab.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4744
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4832 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD508da1b4825560c29a6549ea0c3211162
SHA1141a8fc6fbcc5838444bd1e4f7b34dd32e70459b
SHA25652c1d30bfc5678fcf19669a1d04b1b38ba9f3d0594801c1f3be78982d1f85f07
SHA512062831973d2a71862878293d67fe21aab5189b5ea49f621862ce31fa9870dc6fe1bb338441748c1f92004f03ca8237457117c7383e2c4adae791e3bb6af0133a
-
Filesize
512KB
MD550ed52c0147ddc0946de5330fffd7d53
SHA135c0cf143e97918b8f9bc53a8cd05f4fbefb1015
SHA256d3cbbd84a4f1f0a4421df5492a1c799c8f3d0061ca5139dcff90ea02438d0ca8
SHA512d42ef3a9f511b38fef12b9963d27163b42a9964175326ad050bb5c8987fe5b1d87fef8a4c4b0e9b29f06058a6bddbfc4361c1b0dad33c838268abd9fe6143934
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5ac2e6a5361703d8aff7bde5ec22ca7c7
SHA11d33213326815066e665b761c06744970eb789f1
SHA2561e8eeca64c67d05c6d32c44c9814dd74a59fd5b3f3c07233be584abf862125d9
SHA51208e6a46697c9b1f3c5a131f6a680ee069388e388006e849f86001cc8f856ac22619b666cbd1366397658278f65b422e440188ce68fa89ef51da9c42de3440ca3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD594478eb6e6f0d07f93a199d9b10ba613
SHA1eca3e40feba91967f30d1673cbb2b2b5cdc1168c
SHA256d7b9d92c098936a591c982df8b7a125fefed3d94d232632959aa9da83097efab
SHA51228b23c2a82730193e719ffcbde54ee7a35b9b32bedd8d729d1b620da4d80df1ef6014af230fcbe71b6cf23b77b957d984a3f6ac8bbf90a204d357a876c7d2c7c
-
Filesize
512KB
MD5b843e84dcf79ddf84b8e39bffcfa8efb
SHA1f8c7351b06686a52d90d6f6dea4dea36a6bf66cb
SHA2565248966a99508772e19e3a5cd08d8e27eaebbb737d2ff84dc64f5eedf0ae1298
SHA5120fc4847a8a0584df2298cb8a4865da6516447419de933be4425ed5af8ef52ed75c3ee1f96d909380f3e515daaf0a2759eb1ac05821beab1c888fe832efcd7432
-
Filesize
512KB
MD5c743f7e80e2ae1ec8bd79bd43b30bd1a
SHA1b85d9e8056d99937b71793c41aff826a4c0dc61b
SHA25624d7d9366537ef37a515152990bfa9e5274fb9da02d6984e5aa6351cc5260c58
SHA5125ea5366a6feafa4d2f03f2572af7cd1971bce2e0c9d946c8225325af287ecf0b39b7696eaf8046d4f46cbef342cc9b1fad169330d7d4570871de2a93ec61e6a7
-
Filesize
512KB
MD556365ef3eca285153ea9cab8476035e2
SHA17dae02732db3d45ea35ae93b09672c293e5f22ff
SHA2565cfa13a2758663f4fcc66fc7a76b774d5bbab41783b1072c0e7d15e7311ed012
SHA512bd5dd63a8064b122a18e6e8f62b7f61d3c06cdad8f743a9434186a484da20de19be51a9c81b8200b649bc35986a751b668f58849bbe1f30d7be6fec224f628e7
-
Filesize
512KB
MD5623f58009f2de2acd4c9fda2957e9951
SHA1a174249211c183d333355e7a343732ff7da94fe5
SHA256dc5cff8459e4dd9c8bc2147fe13bb0f309df5c948824141aa5c560af9b0a76a3
SHA5125c9ea801546b0aeb61393d98b3ce253fc5408ef4201408404ed6013e3aee261f7ed3e8990ff8b3666138d9585ded7c4dc5fce9adf147108aefeaed262bb216f9
-
Filesize
512KB
MD5be9e603dc54a421c7ea1f70a53933be2
SHA1ff3e74efe2143e140dbda702f03fa3488fa1b93b
SHA2560cdcaf07ebd53a9cb75c3cd3003055007928fbd9b93042642d44ae918eb6e983
SHA512deb243dacced3e20828770b0e3770a7ad12c915cd1819e860506f623f4315f6049b6400600291c613db17bc4281ca5591cd77c3efd9ad5ec326f2d3b75407a26
-
Filesize
512KB
MD5289372e1b85871a5f7cb96da612cf9e1
SHA1a0afa02ae380a72cea978a79f7e9457d292df00c
SHA256b17f0add5d621959f1b7f6791ec44cd9ea7885fbff325c162c635ed407778582
SHA5122b58155ad507875da6775329680e29d90e0700596cd568f5d60168a09ae6eaa4d3680774098abfa9cd0a53643e9429615ef4599f8eb8c84d927b7609119da52d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD51f2e5b9d210a485c8f7a157db6f20627
SHA199cf88470f54078cf24b92390e1debb486f35bef
SHA256ce59b1c41c865f4a1d3c2d983f2402b50fe9500d7202f9f129931f34953d6713
SHA512113df574edf932d56afaad734f144aabaf37ccb6ef0b6cf8ffc38e825650aa341cb5d9c2c6caa71e45efb755da551946ffee7556635ccd4a022c69670cc8a6b8
-
Filesize
512KB
MD528d8361061c1a00bd45ac40ff06b287c
SHA1fe971e447b8cb7ebf7a99d3337145262c27d36a5
SHA25632233fbeffc15aebbb76b1dbdfdfb31cb89355734cab9d3e7904355bee28f6d0
SHA512ed50e4c666e65c4ff36ffeaf8b20e88069d9074c4c7b23bd6d9c1c4ae35215aa4687bd6080d898cdf2c3d1faae449c8887d20a331db218986972981dee47a237