Analysis

  • max time kernel
    150s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 12:41

General

  • Target

    fa508b3bf1dd57114caa829fdf6986fd_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    fa508b3bf1dd57114caa829fdf6986fd

  • SHA1

    4ad0ef98787a81827ae6726ec6ae320a0eae50c6

  • SHA256

    3387971ef4a52d243b2f85705ca685deccc9dc210c800a314ea4fa902b7f829a

  • SHA512

    34b4af36896aa3db6a697c6550004a7e897f358f0ef95cd20d3896f7a292014582ee131374ffa7357e23df7a1f4362a05c4cd8e81d4af67372a4b7627536c849

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa508b3bf1dd57114caa829fdf6986fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa508b3bf1dd57114caa829fdf6986fd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\umbmobrqfd.exe
      umbmobrqfd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\SysWOW64\dhnsrzuu.exe
        C:\Windows\system32\dhnsrzuu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1476
    • C:\Windows\SysWOW64\acfzedotmlmzrzz.exe
      acfzedotmlmzrzz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3536
    • C:\Windows\SysWOW64\dhnsrzuu.exe
      dhnsrzuu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2076
    • C:\Windows\SysWOW64\yfdhcfrerrwob.exe
      yfdhcfrerrwob.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3728
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          4d96259e93787bda83d7c848d21e927e

          SHA1

          55e38de334981fa45b0f157c537515adb3bf0202

          SHA256

          f771dd88a329fab378413ab76a3a33989f155a35567f7f6c698563d1d0d80487

          SHA512

          102a3be4d2f0ab57f53768111b56cda2832c057287a570118b2d11088004f2e739f4cecce9ea29f2efa1aff71b3643a136df36b43767fd1221772c13fefcc341

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          ad7362d9a4e6e86ff2cac793e4b7575e

          SHA1

          ec0e2de1e59023416c36020b74a5a08e188d1962

          SHA256

          012475e2d39d2be28e7a9dfe55b464f058dc5ca67d5282e14145001113ef014c

          SHA512

          eb535df9f1b4db971eafe6f25973fe7aa34c4ba1cab56d3de64f0deb0cd4852c09d0fcb704b6caaf0cfc5283feeef7a9df78151e49b2397c4cced5fbb9e7830b

        • C:\Users\Admin\AppData\Local\Temp\TCD95AE.tmp\sist02.xsl

          Filesize

          245KB

          MD5

          f883b260a8d67082ea895c14bf56dd56

          SHA1

          7954565c1f243d46ad3b1e2f1baf3281451fc14b

          SHA256

          ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

          SHA512

          d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          a9b6028a5453693140c94b91360a439d

          SHA1

          d95031516b08a48eea84ef80997708af0a4d9b9b

          SHA256

          91dcae94357336e152e2f8e4ff13d50abc06fb0b49166d2eda5f2f9af1e489cb

          SHA512

          9865424c14f1903e73de28004658f3471f69c561e16b934b9015e9ddadf9a8a485c15bd83988352fb00c93c828905e36f28169dcaf09010b64f2c5ced48e4b92

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          430139a45b146e87c83e4c293391c11d

          SHA1

          bdf6db0f29066f5503af6d9eef54257fc9262b56

          SHA256

          e10befef7a8b87ad825f0f54aa5701a97621b0da32a16fc9128c6bc879ee5d5c

          SHA512

          003a0f1f24cde2fc53011dbd7ef6771696d4297c06e406a3448f5a6394895f9e6fcfece0325792436a1be24920a5b7cd5523117a7e12ff1f69e9ef3fe87cd719

        • C:\Windows\SysWOW64\acfzedotmlmzrzz.exe

          Filesize

          512KB

          MD5

          07e693c6bc8b5d3ad3df6d17d99327bb

          SHA1

          9d35ee7a93c95802b8c62e9846e644dedfb16634

          SHA256

          aba4ab2c834b4b568599d41f18e60294d6f81d9344f3b40b4b8d93b7e96a0bf6

          SHA512

          cc22a6f42cfc35ce4a22373046b872d40bf634730febfc4221cbd7a5de799d2550f68384a908a4a0c1f6795a2dfd43e9f2645d41ff61ca633a2c6690024ffed9

        • C:\Windows\SysWOW64\dhnsrzuu.exe

          Filesize

          512KB

          MD5

          91cb4376bf7cb247b1c950025619979f

          SHA1

          9861180c83487250a2e55d96fa20e840d2989f01

          SHA256

          8ad5cfa28a6b7f58fcdb2e2aaad2fb316545c95ad00ebc2affb0a09bacd8e66e

          SHA512

          a96fe65bc3876d423d6a3e2c3f11e7104641547b3871ff05589e8cb611938fd8a00058697f1e1bca051f16a9be436fe1a2b786e6245594828d4330765915a237

        • C:\Windows\SysWOW64\umbmobrqfd.exe

          Filesize

          512KB

          MD5

          2e15d4995e5f7ff1325ec4c51042f779

          SHA1

          5f3e4331ef01a5007c6eeededc91bdb668759f4e

          SHA256

          26d20f324ffec53c548114ddd69d9f98fdd9ca5c6608907e35d332597329665b

          SHA512

          110284885e2e89f22cd7e0054f3dd8a926abb2cfee7424841e46eff67dff8ad9eeb44c2b335c275eb5cb034904917b5e01ebf197723c795c970d557ba736926c

        • C:\Windows\SysWOW64\yfdhcfrerrwob.exe

          Filesize

          512KB

          MD5

          61c8a5b4edaca39c89e323099a66ae53

          SHA1

          27b94b5859d84544ab0a3b9efbf2e1020f36835c

          SHA256

          48b2a1aee4076051333a4b4d5e00746f46bfc2304aa075ae63d4878a6558fa97

          SHA512

          8429f0e3f242d5350c230fbdd7d6706cc448cbc8deef998abb303d3b6c2d53e9d7066f3ec6b594d406a9562e5661a1ef19758c35f9a64472cccfbc7e1b6f2e21

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          840566047ae13ee49585b9486b5b4d84

          SHA1

          dda8ebe5bbf0ccf29cd9c959c6e0d9184c39edb5

          SHA256

          782af6327d07e3ccec77b3abbefa838427b1ef07d618ef8b92efcb157d6e1ca0

          SHA512

          df5911e2bb96e415132ed5248de7e23a956288291f24344f92e293c811174f99ea5513ad59ae2659e9118d1abd5b0fe6e5b1665c83449867cae04b180ac70409

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          593419c0fafd90d7eb414d63ce6f3bb6

          SHA1

          e3f2b8c2f11a7c843b63cc1fd407f6d6ceb65242

          SHA256

          5638e145669e033353b2ae010a0731afc291d6f42445766ba0fcec258370b965

          SHA512

          9a7e3eba4660d2f5459208767c2688a5584cabff206096313bfe29002c1eadb69c7ebf70c9dfd8561840943a3ad5cdae22619533a469eb280512f7b200bc73e2

        • memory/1932-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/3752-43-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-38-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-47-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-49-0x00007FFA0F1E0000-0x00007FFA0F1F0000-memory.dmp

          Filesize

          64KB

        • memory/3752-50-0x00007FFA0F1E0000-0x00007FFA0F1F0000-memory.dmp

          Filesize

          64KB

        • memory/3752-46-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-45-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-44-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-42-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-86-0x0000018D6B3D0000-0x0000018D6B4C4000-memory.dmp

          Filesize

          976KB

        • memory/3752-39-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-41-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-40-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-48-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-550-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-37-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-592-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-593-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-623-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-624-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-626-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-625-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-628-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-627-0x00007FFA114B0000-0x00007FFA114C0000-memory.dmp

          Filesize

          64KB

        • memory/3752-630-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB

        • memory/3752-629-0x0000018D6B3D0000-0x0000018D6B4C4000-memory.dmp

          Filesize

          976KB

        • memory/3752-631-0x00007FFA51430000-0x00007FFA51625000-memory.dmp

          Filesize

          2.0MB