Analysis

  • max time kernel
    149s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 16:07

General

  • Target

    0127157e92f97a8e8e05ae6a7d42dd24_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    0127157e92f97a8e8e05ae6a7d42dd24

  • SHA1

    b1efbdc6672560f2835346ce75bb27a50d600777

  • SHA256

    788a64bcdb1fd5ab9203dce06033a729cc13514db575ca086995272326583316

  • SHA512

    603c574225ec98503fd867005b3b477c7668b65ec081bc3bd4a006f3dad8d64a49a9924503fe297471acc8b36cc122d6ad4c20d52bed716af816632ae482eb3c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6x:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5G

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0127157e92f97a8e8e05ae6a7d42dd24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0127157e92f97a8e8e05ae6a7d42dd24_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\wtezgyngwl.exe
      wtezgyngwl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\SysWOW64\orvdjvah.exe
        C:\Windows\system32\orvdjvah.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3636
    • C:\Windows\SysWOW64\uvyoodaiorpbtvy.exe
      uvyoodaiorpbtvy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2100
    • C:\Windows\SysWOW64\orvdjvah.exe
      orvdjvah.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4460
    • C:\Windows\SysWOW64\xgimidtenozjn.exe
      xgimidtenozjn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4188
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    1f942a0ad708e7399dc8583291876b2f

    SHA1

    2592edc715d5d977c59d60e3a0d9d3294bc75601

    SHA256

    92bdcb9994f9d8284a5657aaedf2da65536d3e51e6be6553f967c849c59793b1

    SHA512

    d3063400886c7a1220f5197ca2f1b2b0959c04c619ee8894b1250dbe0b621f2fe414dceb42baa58a3d13db6f818293c983ee3ab980d3162ad9df2d15e5ba4c40

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    3f3c69de5dc254c0c9cc44300355393d

    SHA1

    f889b6e1c38d968f57d84ac2a2b67b8eff4d2bdc

    SHA256

    aa415da6fad297c84699a529700949406c2e43e725ccaa51f8037507d502b6f7

    SHA512

    2d0717bf90ed0398be9a9fd06bcb7b33f724233583cbaad16bd24a25b04e185152b4b94ae3eee888d28f827ee55112c2f64718a4c89ef54c9bbe9c815ae45c92

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    247B

    MD5

    b9b19cc3197448cce687bb8508db123e

    SHA1

    fe255f32e51db4675547affd0b9bc052c0445b5f

    SHA256

    15c16681c0a32a4d0634ed2ba3433317be72fa0d6cc0a253bfdb6531aa30c4f7

    SHA512

    b66f52a57bbe4e3e131510dcf2945faf8027f329322981a8cb8e033ebf2c4e08fc7a1a9dbd40f8b4cf94d13176696908c080812e178723dc0a71092e9a003698

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    629a3e276e4917dfca5fb611735fd104

    SHA1

    420885fdfa2a38c79344fa742469e27040c95e6d

    SHA256

    812c470608212cdda000bcb6cae1202ebc8a7a83b2c8c585c12e97fbddda16f7

    SHA512

    2f3473320a74b0726c9c94e7235aa310e1f5916aa84ba459b0ff78e6fb0ffa3c891d896cb360d985813c0c645b3fc2e3b192cf8da1c5bfb51c7229b89e46ddcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    74514fac2e281807beec84812c074477

    SHA1

    43c3988a3ec21ff887c643d7eccf03cbcc9cf572

    SHA256

    1d79e3e19378362bf8b81054d80ac7c4a191b2671146f5db915568f7ba9e1485

    SHA512

    3ceb3329362ab9d5274cfab13915492ad322e7a59a95ee489537db06232fa34b115f2a33105247e6e4350fe470674ad0914b30fc62a4ea43e97102f560979867

  • C:\Windows\SysWOW64\orvdjvah.exe

    Filesize

    512KB

    MD5

    db5aaad1715aaabccf382196b120ffa5

    SHA1

    7c0edc1e360f1aefc34a168402a751b69429cbf1

    SHA256

    ddabb52f3c2162acd26406a332e01b84d323b5b0f3b97041307468a295dbadb3

    SHA512

    03037409888f40cb80f022f3f6edd5f33cc3c94c39ad881bd68e3eea9fcb0ac740b829073d82411f50eaa21b5e171c4c704ebbabbd03946beab5483b858d255e

  • C:\Windows\SysWOW64\uvyoodaiorpbtvy.exe

    Filesize

    512KB

    MD5

    915b6d6f096764b9493301805ec66e84

    SHA1

    a284657102451f9819b2f27f741e1130204efda5

    SHA256

    efa8b0aab87e4de0a3357930ce2dfed5e4f89e6c92769eda2d54e6c39f5f5b7e

    SHA512

    3b0a082bd44e20bb427c44ee55f0f07bbbd591ad9fc8e4cede80c7f3bb2749b382733d8b081505674f6e000d18b93e4ff8c37283d2cd3bb976efdc84a8f29857

  • C:\Windows\SysWOW64\wtezgyngwl.exe

    Filesize

    512KB

    MD5

    f0b44951c50cebc01961b72b485272ca

    SHA1

    2bd43dd9df0641b1b114e2d5cb1fb92330773d31

    SHA256

    31130ce339197ab1b426520ddca3717894c9662577a51c31019fb84026fb83d1

    SHA512

    edd8a543dd368a99e342d8caa4067130f4a8f6864298134a09e75fcafc0a655be76da8c873e99eadfb0cee2aa66fe951cd79c24d7664f0967b6d17b5f97665a6

  • C:\Windows\SysWOW64\xgimidtenozjn.exe

    Filesize

    512KB

    MD5

    f93efabd18f1a1d46ad5cd7615f2eae7

    SHA1

    7940ad8e6e0546ed0b891bc011d780a776ebc9c7

    SHA256

    780d474c818b921319c2fd534994509a7a292c38fbcb4360ef4fdd867b951af5

    SHA512

    b831fbee54c0bd1e347f7cfe87d791bea03201a5c9caf57a5e722227885e4ec4d7fc934bfca92db9106fa0ed6461f562037ff233ed09953874582087b94d6488

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    19cb3abab32459c57c32427eb4a1ec42

    SHA1

    da7b9e9c240d12d12310d1f9a4c14629939dd54e

    SHA256

    ed04c7f2f864e79b35bfb1c86c2193c1f2411363132e17a1b12534ef3cc4902b

    SHA512

    a2a185a5dcf10985c278f04141adbc1108568eee1abb4e7e3550509b4903df4229c8929ac18b1f4cbd2eef34a78a132e95c02306351bea9ba3729e9b7b3a2e3e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    85c641515115dc66089b023c4982dec2

    SHA1

    150c37cd7a5281dbad39f3dcb6f6933fafc85412

    SHA256

    4f24ccadc939b850da19d8e5b9519fba3ef090eb2e8ef1be5b46ff88e4a5a09c

    SHA512

    5faf6e966c25507f4f992a5b2229df7da0f46102e9d4ad2a2ceb44333254ad479eef5e02967fe853d4c5f6b7ec52fe8a1b35e46fb8c9c1cd4b5e0172c9284be9

  • memory/1544-35-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-38-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-39-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-36-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-37-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-41-0x00007FF931080000-0x00007FF931090000-memory.dmp

    Filesize

    64KB

  • memory/1544-40-0x00007FF931080000-0x00007FF931090000-memory.dmp

    Filesize

    64KB

  • memory/1544-113-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-114-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-112-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/1544-115-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/2096-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB