Analysis

  • max time kernel
    167s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 12:18

General

  • Target

    fa477ca67f6789158c11650c86679dfb_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    fa477ca67f6789158c11650c86679dfb

  • SHA1

    95c01b1dcb3f73bf0afa8b25f1d9b7169990d37c

  • SHA256

    c510182a81ae86599ef21b56332561c7cbc0ceced418267c4c19cd44eb919a56

  • SHA512

    d4987a6889820c388c8a3d582b1fc651f42c2517b7f5013376ba523ef299e8206532bb503eff0269ca88c68d217767a28f30a015a2de7efcd97149c6fee4cd22

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa477ca67f6789158c11650c86679dfb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa477ca67f6789158c11650c86679dfb_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Windows\SysWOW64\pdntvzmzft.exe
      pdntvzmzft.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Windows\SysWOW64\dqitxnpb.exe
        C:\Windows\system32\dqitxnpb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1716
    • C:\Windows\SysWOW64\itfmbdbizatfxcd.exe
      itfmbdbizatfxcd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4068
    • C:\Windows\SysWOW64\dqitxnpb.exe
      dqitxnpb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4416
    • C:\Windows\SysWOW64\riniawdpscbqy.exe
      riniawdpscbqy.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2540
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    21920f1e2b2be9f430fdfb64a1e14c40

    SHA1

    2b6ca53df72e838aff3dccb97ceae007604bf07b

    SHA256

    e1392b1da24248d4e6e42e20f3d66aa159e47ca21aae6c2963187a0a53749d5a

    SHA512

    a9586d202e001f41f3e8303ffed157456b6c6a5454c21aa3755843c2e9e0ca4f5444687cd5d748c0f98ea6706f0a541f2f671c016d19c422e4121ff0c9433aad

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    dd8ab59b5fa603df39cd7667ecb545b7

    SHA1

    f385723afc5ba74b3492298397519d0e964c79c2

    SHA256

    ac85220f2c49530ffa019185d363793313f9a710e4d1dfb19f849bec7cbfbf6b

    SHA512

    b3ed6f5e07c73c0fb03e5d27271d7c4a276202de6fe87e5102f7dfac8e51563f93e336c58b152d4fee317a42e69cfc375308f54f7f27ee23f55510c709063bc5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    f5f219efcf259c0c15a0521bf15fafcf

    SHA1

    68b81f987dbe56b2c44e1c2b8ef4a9c078ea7a5c

    SHA256

    d72d7074d338c425e95ab938b674f45cf7afe1e96a1434d956df4bbd0ecdebf9

    SHA512

    d798ed0683b4bc7b025f5ebe96c8b557948bb7570a3ba7efe4d1844014e4415eead9c06db7454f2f5bc8a83fabea619173cea271cf12945b451c8f357c36ac54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    06019a730fbc1efbc8ec8e430baa43bc

    SHA1

    28668c701b588936efa3b5d6df9ad778bcf1c37f

    SHA256

    2d3e565667078a33730c521102e079b34f72a1b69f0334aa2975497e5b0fb2c2

    SHA512

    d8cdf7470a98cd6801755107299d4c5b06d06bc2d87cf29a9c6180af7dcec565197b12ffec0d2ca56e505295a75731e161f2aff3b87deb3b08dabef9c6ad5c0e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e8a9d0db27a6437b1d236b99c1db6bea

    SHA1

    4fc6cbf93bfa76364d3ae57340a179e7cd11a465

    SHA256

    fc8c55de8f9bef1de8f06fe02e492f6c673fd86c345d48ec0fd3ff853e9cce4e

    SHA512

    784f529b2cfd4cf450353c44c8ca1b425fdc1ef2ca3289dfad603c90940a2047a294f8232cfeebce9fab70ca2a7ccf38e2b20b9690b15cbab27cee8a647a634e

  • C:\Users\Admin\Documents\MoveMerge.doc.exe

    Filesize

    512KB

    MD5

    a8f5aa067a9aa7116f448849564cf026

    SHA1

    3d9f6a8840c82b9b119d6cf5131765893f033c4b

    SHA256

    7f0d031b255e56658c977e655041cd1bd1eac6d7ffe01dfdd48673cd6da3cee8

    SHA512

    526a2eeb1a8399e6ac3b2cd029ecbda63bec4f744199784a36a0d7fd596e9fdb4cda017835d927ba4181b1881fe69c84aa5356bcd0d40cb31fba13ea4b8e2394

  • C:\Windows\SysWOW64\dqitxnpb.exe

    Filesize

    512KB

    MD5

    fe3ee94f819267346b4dab1bd972e27f

    SHA1

    1fe7e4ae1a32ec849c6e13768ec3dd448152ea66

    SHA256

    cbd534317b3d83b11942b65a52144edc8a3d4076f7ffebf7d2f624cd969502aa

    SHA512

    44feefc6ec77d2182efb99a78ca79ebbbe7fdec73c7839180aa068f8302d3d563e8026a609b2ffcc5cb9f7ebb3ac16f663c78763d8ce8587d3fd26715f02cff3

  • C:\Windows\SysWOW64\itfmbdbizatfxcd.exe

    Filesize

    512KB

    MD5

    fb4f90b4b0942d9a3804d60cc76026f7

    SHA1

    293bcc0344325555c379ca04461ff63c86f6bf42

    SHA256

    f669b45bfb7d116b16075b40cbf4832a90dabefef87c7c7158e7f7879d7220f8

    SHA512

    3dae8e97436c6906abd153246b68658b8159df79c11b0d18e749a7014845a49e3532257144c59c7c5328415f3ed7133b3fbcfb09e1c8df7546169bd4efbbd17f

  • C:\Windows\SysWOW64\pdntvzmzft.exe

    Filesize

    512KB

    MD5

    0c25a1c55ae28f84c50fd8c9a982972c

    SHA1

    9a5efe9ae3f6d7987e7b426ee942db29c33bfa08

    SHA256

    668bda50140c8df84d006540456210424b75f95d87c53c940da2f20d0711c9cb

    SHA512

    b0d8fa2deca6209b4decfbebad6ade1a57cdc46ff3aa35cdc76b56ddbc76c80c89567628977ad321514c3c6ba6018b4086e5adaf1be7d2b17ed38de068ed62de

  • C:\Windows\SysWOW64\riniawdpscbqy.exe

    Filesize

    512KB

    MD5

    415c10eb17d4c0620b42becb85c51975

    SHA1

    3ba54837bc5e8c6b2a09ef001e921911dc97a543

    SHA256

    07be243c2e079140b98fd6c80386e1d8c650fc6ecdcc6deba763e1c75f9fbfd4

    SHA512

    1f831b122cd04835a10848f138c299b5557533306b44e4df8e5ed19c55edb97a386393394b769e4291f515a8bd4b874e4cf76615a936ea900d7b86f35c28fadb

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    73967538c657a7d9061b2ce1462a1df7

    SHA1

    ac182dc92ba6ca9c66f9c34185238d599e3659dc

    SHA256

    47ae9dc4d9b5cc660265db1b4ad82f137d29b2f72d77398dd38ff86504badb48

    SHA512

    7beab4360584130f3f87bb2366c421ace3821ced48f9f050ea8fe24c0ff18ed031ca2a94101ea8061ebd2d655a82ea297427a59f5c3c5cd8340dd370b38672b1

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    9dbb906811848a691d0ddf31be21d494

    SHA1

    84a4fa861b91f6ea6a51934dd34ff3b83b3eb14b

    SHA256

    42c1446231aa0e1c9a4e52207b6f7539f440d6e4cc96619a4670fac61a84b982

    SHA512

    3966b70b504ad091ff01f84313e39f1b3f8919c34f22b7994b42595d8468568e00b3d9a088d7ada7f1968c244c38355c31e3afdb6cf2b0d4f38b8d8278e19034

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    4eb67480704af9e5405b1382e8264480

    SHA1

    72ec0032331666b7837481030791206cef494bcc

    SHA256

    2199b3bd3ac85b663523992426b44df61e93fb4e7674062bf36872732cfa23c5

    SHA512

    571abde9dad8f357507b656397f5f1ce38c9be2331722c0a00ce8423646f8e1ff7a07f48b5cfa78c5338f259277155a6a42237ff824821d229ef336962d4cc54

  • memory/4336-37-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-41-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-50-0x00007FF8D73B0000-0x00007FF8D73C0000-memory.dmp

    Filesize

    64KB

  • memory/4336-45-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-42-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-44-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-43-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp

    Filesize

    64KB

  • memory/4336-48-0x00007FF8D73B0000-0x00007FF8D73C0000-memory.dmp

    Filesize

    64KB

  • memory/4336-39-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-40-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp

    Filesize

    64KB

  • memory/4336-101-0x00007FF919670000-0x00007FF919865000-memory.dmp

    Filesize

    2.0MB

  • memory/4336-38-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp

    Filesize

    64KB

  • memory/4336-35-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp

    Filesize

    64KB

  • memory/4336-36-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp

    Filesize

    64KB

  • memory/4592-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB