Analysis

  • max time kernel
    150s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 02:02

General

  • Target

    0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    0229f4c852b759575d57f4cfd8868a30

  • SHA1

    4861969eaf8b8ec2d516f1cb054dfcbcde1e7431

  • SHA256

    48d2afb7b7d80c9507169504ea8dc1e6b2812e550cc77dd05d3ef4578eac4224

  • SHA512

    ee03efca071977fab6a087e99bad4f9d74d251590a5f3a70895e30a6c9eb8593447f1152628274468164db0e5f6d4082d49bb6d482da48baa2e7535681774a97

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj64:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\SysWOW64\cwksczzzou.exe
      cwksczzzou.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\SysWOW64\ujoxycgz.exe
        C:\Windows\system32\ujoxycgz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1812
    • C:\Windows\SysWOW64\lgyfcxzvnocjqzz.exe
      lgyfcxzvnocjqzz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2532
    • C:\Windows\SysWOW64\ujoxycgz.exe
      ujoxycgz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:60
    • C:\Windows\SysWOW64\huiapnmneniwj.exe
      huiapnmneniwj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3724
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    e5156047a033da5f3c94e4ea51aa049c

    SHA1

    f2cc2a3cb4a8b62f2211c1b7cd4d3fd974f767e5

    SHA256

    a1630cf7120525ba2cc2f77a9ae4c77146007acf5ea88bca5f6eb72d6ab0059c

    SHA512

    3594edcda3c055ae4ffa56a003aa78dd5e0ad8f15e248514f7ca3571aa27d0568fd0f9418cc79bb049161482ebaad3ce896bcf262031e782cecc4c4d6078996e

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    984278806a1a1f8180433cb4f8a07a06

    SHA1

    e86bcd76d886c977aedc97b3b127ceb2fb2c70c1

    SHA256

    db9a264b5d4e3296d0b91a232411953c6388484a4f537ef256804ea2a8ec3f5d

    SHA512

    99cde1f21c86d228061e847db1709d7d92f701c69bb18d7f8f6108f5f7d6eac171c2b7d2ee2efd2a2d1d8594869af7523fa36fdfb4e1540a8a7dd5aa74ee84aa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8cf4b99b80805dd742f94961efdfb3db

    SHA1

    0425ad33e269a5ee8126345391d2768c5d223656

    SHA256

    90b9309f05cd5d8e8575b2cf8f8acaa519f0c788c64d1e64670072f2fae9e884

    SHA512

    72f8f9fb985525aff0369bfd3e6959a7518c6aa6d4eb224b5d470fcf0ee667e57bc69d146cfa3c1ba5c1df3d8c240f09f25a839003642f1ce03e0943d487796d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a52a18950761d0e417b9bf1011d12780

    SHA1

    1bb3cc185b9639a8ab16d9da9f85986b72ff1eb3

    SHA256

    5acedf1cba6bdb9c3f9677c970b1e469d1a2fc67d56f0d61afea808f07477c26

    SHA512

    221b5f9a9e36c43bfabdf395d4b7db9c26868f0dfdc08363f53ae8e8ab92f52d8160edceda87e22b90a60a591159da3bf7c577073fde62c7df465b1feb167b43

  • C:\Windows\SysWOW64\cwksczzzou.exe

    Filesize

    512KB

    MD5

    5511ab8447a55f3be6749a076758f33b

    SHA1

    dd7792bf49e6badf010fbc19b9217a41e9472926

    SHA256

    5dd1624fed70bb81559dd7d3a9e6852b7a33654c6349e984ff19b9695bdfc201

    SHA512

    a5df8ad89328b3eedd3bb1ef99b8145e8038d8d8b93bd44e4de3fcd1d5c365171f2cefbf31ae8697b1cd850ae5a8747c1dc8ce418bbd58221084adaaa82aa64b

  • C:\Windows\SysWOW64\huiapnmneniwj.exe

    Filesize

    512KB

    MD5

    4a99f024e2a8ebbccf37fc150b8b4fdc

    SHA1

    1647f98840a6cd1a87f5a27bc2b0186d9b09d340

    SHA256

    4f4cfa64735cd8290ed09e1439f9e13e8bd2bdbb8a17c1350e7aad242a2d657b

    SHA512

    4981f5a48e996b88c4497cd04ef0c418df3ba7e62d3324d941fd9c11cf5d2491851aafa557d628e4985843d56985862d606c19b786384a44b78291665a6b3960

  • C:\Windows\SysWOW64\lgyfcxzvnocjqzz.exe

    Filesize

    512KB

    MD5

    1829d84299084238b004e9c1eb0b95c9

    SHA1

    d17fb7f58901b36548175831e99ca2c31412aff9

    SHA256

    2f28ae1b293cb3d512c6401c18937ae6b2713cdecf25dcefe342f076414150a8

    SHA512

    014ac777f542e91009613e9901d3b5b8f64294a58855d211e165066fc2e1d7b7bb408ea8a8f836d3340651a176307a7c24cad630cad2f315d957e5203e6e2c94

  • C:\Windows\SysWOW64\ujoxycgz.exe

    Filesize

    512KB

    MD5

    6d1080ba512a64a0a197c98f9c51c2e3

    SHA1

    7d7d367b7868c016ffc0077939b1ab3537793d29

    SHA256

    0e27ec78275b2c5e6f0952349a613337dcc461347f34c32fbe7df6626c78cc70

    SHA512

    8723a11999639d52e09f54af09217b252338494b88194352a669b9c843689a140c64633b29a3c9681757d1b68285c1f46990781e3727a19337165508180eec4c

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    7a43f39fe2bfc703594fe098f87a3685

    SHA1

    35a94fe32cbb15bb7f55edeb0a365df66cd5d40c

    SHA256

    d14bd07539dc61946676ba8cd097c7268a9b803c232c1bc2843d4f7bbb105fc8

    SHA512

    4938b2a6c433f49e24ad3c5f63cbcd0aefe9493fbb21d614abbd27ced5bf73234bbaca6d92c99c8ea3d627b3c1307e6e44fa8cfe11ce6c65ddccc8e8c44b30ef

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    f1576cd6e1d2cd9db9fd11d415161e69

    SHA1

    3f866cee82688368c85b477d91e13dd2d7b005e4

    SHA256

    44b96507c48721ffdcad7b465c8f11e4c1449e9d4929aabd6b53d17b735d07d1

    SHA512

    3a78e8fa5bc1168f5215718a7dd3628bfe20fec6dd97629089f5662e9003cffb5bd1f62b18c2d39b8d6734f25d1483bc36f0e76fb373764519d439370ba1e17f

  • memory/800-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4524-36-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-38-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-35-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-37-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-43-0x00007FFF03950000-0x00007FFF03960000-memory.dmp

    Filesize

    64KB

  • memory/4524-39-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-42-0x00007FFF03950000-0x00007FFF03960000-memory.dmp

    Filesize

    64KB

  • memory/4524-112-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-111-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-110-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB

  • memory/4524-109-0x00007FFF062B0000-0x00007FFF062C0000-memory.dmp

    Filesize

    64KB