Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe
-
Size
512KB
-
MD5
04542f267718e0a8555ce33cf08ea44e
-
SHA1
0a387dfbeab37809d90b523fcf7cd2c09f8ae2ba
-
SHA256
c676c2895844d4715fd167281457e073e535e6045d4bcadd9a7a27398b84de7b
-
SHA512
ca83799a0ec9e0d0aeae33750e4e4820f2dcc8922c247eafd2ba1abf0d94739407eb4a0bb67d83aba7405a0fc7afad1ef8c919d227d9a3711d7def2c6d8bc0e1
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6S:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
btgxbcuzsy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" btgxbcuzsy.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
btgxbcuzsy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" btgxbcuzsy.exe -
Processes:
btgxbcuzsy.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" btgxbcuzsy.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
btgxbcuzsy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" btgxbcuzsy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
btgxbcuzsy.exeaermlnjnpwzvkhb.exejnqnoqek.exelfqattgnmuozm.exejnqnoqek.exepid process 1548 btgxbcuzsy.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 2480 jnqnoqek.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
btgxbcuzsy.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" btgxbcuzsy.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
aermlnjnpwzvkhb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\untooraf = "btgxbcuzsy.exe" aermlnjnpwzvkhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hrvjhswj = "aermlnjnpwzvkhb.exe" aermlnjnpwzvkhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "lfqattgnmuozm.exe" aermlnjnpwzvkhb.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
jnqnoqek.exebtgxbcuzsy.exejnqnoqek.exedescription ioc process File opened (read-only) \??\v: jnqnoqek.exe File opened (read-only) \??\g: btgxbcuzsy.exe File opened (read-only) \??\k: btgxbcuzsy.exe File opened (read-only) \??\o: btgxbcuzsy.exe File opened (read-only) \??\m: jnqnoqek.exe File opened (read-only) \??\g: jnqnoqek.exe File opened (read-only) \??\o: jnqnoqek.exe File opened (read-only) \??\r: jnqnoqek.exe File opened (read-only) \??\z: jnqnoqek.exe File opened (read-only) \??\t: jnqnoqek.exe File opened (read-only) \??\j: btgxbcuzsy.exe File opened (read-only) \??\v: jnqnoqek.exe File opened (read-only) \??\z: btgxbcuzsy.exe File opened (read-only) \??\e: jnqnoqek.exe File opened (read-only) \??\e: jnqnoqek.exe File opened (read-only) \??\j: jnqnoqek.exe File opened (read-only) \??\m: btgxbcuzsy.exe File opened (read-only) \??\k: jnqnoqek.exe File opened (read-only) \??\q: jnqnoqek.exe File opened (read-only) \??\t: jnqnoqek.exe File opened (read-only) \??\x: jnqnoqek.exe File opened (read-only) \??\r: btgxbcuzsy.exe File opened (read-only) \??\g: jnqnoqek.exe File opened (read-only) \??\n: jnqnoqek.exe File opened (read-only) \??\u: jnqnoqek.exe File opened (read-only) \??\l: btgxbcuzsy.exe File opened (read-only) \??\a: jnqnoqek.exe File opened (read-only) \??\l: jnqnoqek.exe File opened (read-only) \??\u: jnqnoqek.exe File opened (read-only) \??\n: jnqnoqek.exe File opened (read-only) \??\p: jnqnoqek.exe File opened (read-only) \??\s: jnqnoqek.exe File opened (read-only) \??\r: jnqnoqek.exe File opened (read-only) \??\z: jnqnoqek.exe File opened (read-only) \??\n: btgxbcuzsy.exe File opened (read-only) \??\s: btgxbcuzsy.exe File opened (read-only) \??\j: jnqnoqek.exe File opened (read-only) \??\y: jnqnoqek.exe File opened (read-only) \??\b: jnqnoqek.exe File opened (read-only) \??\y: jnqnoqek.exe File opened (read-only) \??\p: btgxbcuzsy.exe File opened (read-only) \??\h: btgxbcuzsy.exe File opened (read-only) \??\x: jnqnoqek.exe File opened (read-only) \??\u: btgxbcuzsy.exe File opened (read-only) \??\v: btgxbcuzsy.exe File opened (read-only) \??\a: jnqnoqek.exe File opened (read-only) \??\m: jnqnoqek.exe File opened (read-only) \??\w: jnqnoqek.exe File opened (read-only) \??\a: btgxbcuzsy.exe File opened (read-only) \??\b: btgxbcuzsy.exe File opened (read-only) \??\q: btgxbcuzsy.exe File opened (read-only) \??\p: jnqnoqek.exe File opened (read-only) \??\h: jnqnoqek.exe File opened (read-only) \??\h: jnqnoqek.exe File opened (read-only) \??\i: btgxbcuzsy.exe File opened (read-only) \??\t: btgxbcuzsy.exe File opened (read-only) \??\o: jnqnoqek.exe File opened (read-only) \??\q: jnqnoqek.exe File opened (read-only) \??\e: btgxbcuzsy.exe File opened (read-only) \??\i: jnqnoqek.exe File opened (read-only) \??\x: btgxbcuzsy.exe File opened (read-only) \??\y: btgxbcuzsy.exe File opened (read-only) \??\s: jnqnoqek.exe File opened (read-only) \??\w: btgxbcuzsy.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
btgxbcuzsy.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" btgxbcuzsy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" btgxbcuzsy.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4484-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\aermlnjnpwzvkhb.exe autoit_exe C:\Windows\SysWOW64\btgxbcuzsy.exe autoit_exe C:\Windows\SysWOW64\jnqnoqek.exe autoit_exe C:\Windows\SysWOW64\lfqattgnmuozm.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Program Files\WaitTest.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exejnqnoqek.exejnqnoqek.exebtgxbcuzsy.exedescription ioc process File created C:\Windows\SysWOW64\btgxbcuzsy.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\btgxbcuzsy.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File created C:\Windows\SysWOW64\aermlnjnpwzvkhb.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File created C:\Windows\SysWOW64\lfqattgnmuozm.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jnqnoqek.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jnqnoqek.exe File opened for modification C:\Windows\SysWOW64\aermlnjnpwzvkhb.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File created C:\Windows\SysWOW64\jnqnoqek.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jnqnoqek.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lfqattgnmuozm.exe 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll btgxbcuzsy.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jnqnoqek.exe -
Drops file in Program Files directory 22 IoCs
Processes:
jnqnoqek.exejnqnoqek.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal jnqnoqek.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jnqnoqek.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal jnqnoqek.exe File opened for modification C:\Program Files\WaitTest.doc.exe jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jnqnoqek.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jnqnoqek.exe File opened for modification \??\c:\Program Files\WaitTest.doc.exe jnqnoqek.exe File opened for modification C:\Program Files\WaitTest.nal jnqnoqek.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jnqnoqek.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jnqnoqek.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jnqnoqek.exe File opened for modification C:\Program Files\WaitTest.doc.exe jnqnoqek.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jnqnoqek.exe File created \??\c:\Program Files\WaitTest.doc.exe jnqnoqek.exe File opened for modification C:\Program Files\WaitTest.nal jnqnoqek.exe File opened for modification \??\c:\Program Files\WaitTest.doc.exe jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal jnqnoqek.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jnqnoqek.exe -
Drops file in Windows directory 11 IoCs
Processes:
jnqnoqek.exejnqnoqek.exe04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exeWINWORD.EXEdescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jnqnoqek.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jnqnoqek.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jnqnoqek.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jnqnoqek.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jnqnoqek.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jnqnoqek.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jnqnoqek.exe File opened for modification C:\Windows\mydoc.rtf 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jnqnoqek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exebtgxbcuzsy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFDFFF84F588569903CD6587D92BDE3E144584267316234D799" 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" btgxbcuzsy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" btgxbcuzsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat btgxbcuzsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh btgxbcuzsy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" btgxbcuzsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc btgxbcuzsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf btgxbcuzsy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" btgxbcuzsy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33412D7C9C5582576A3E76D377232DAD7CF665AB" 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB4FAB1FE16F194837C3B3086EA39E6B38F03884262023FE1C542E808A8" 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" btgxbcuzsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs btgxbcuzsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg btgxbcuzsy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC1B15D44EF39EC53B8B9D332E9D7CD" 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F46BC2FF1B21AED27FD1D38A789117" 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1848C70814E4DAB1B8CC7FE7ECE034BC" 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" btgxbcuzsy.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2872 WINWORD.EXE 2872 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exebtgxbcuzsy.exeaermlnjnpwzvkhb.exejnqnoqek.exelfqattgnmuozm.exejnqnoqek.exepid process 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 2612 lfqattgnmuozm.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 5112 aermlnjnpwzvkhb.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exebtgxbcuzsy.exeaermlnjnpwzvkhb.exejnqnoqek.exelfqattgnmuozm.exejnqnoqek.exepid process 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exebtgxbcuzsy.exeaermlnjnpwzvkhb.exejnqnoqek.exelfqattgnmuozm.exejnqnoqek.exepid process 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 1548 btgxbcuzsy.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 5112 aermlnjnpwzvkhb.exe 2192 jnqnoqek.exe 2612 lfqattgnmuozm.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe 2480 jnqnoqek.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exebtgxbcuzsy.exedescription pid process target process PID 4484 wrote to memory of 1548 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe btgxbcuzsy.exe PID 4484 wrote to memory of 1548 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe btgxbcuzsy.exe PID 4484 wrote to memory of 1548 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe btgxbcuzsy.exe PID 4484 wrote to memory of 5112 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe aermlnjnpwzvkhb.exe PID 4484 wrote to memory of 5112 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe aermlnjnpwzvkhb.exe PID 4484 wrote to memory of 5112 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe aermlnjnpwzvkhb.exe PID 4484 wrote to memory of 2192 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe jnqnoqek.exe PID 4484 wrote to memory of 2192 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe jnqnoqek.exe PID 4484 wrote to memory of 2192 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe jnqnoqek.exe PID 4484 wrote to memory of 2612 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe lfqattgnmuozm.exe PID 4484 wrote to memory of 2612 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe lfqattgnmuozm.exe PID 4484 wrote to memory of 2612 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe lfqattgnmuozm.exe PID 1548 wrote to memory of 2480 1548 btgxbcuzsy.exe jnqnoqek.exe PID 1548 wrote to memory of 2480 1548 btgxbcuzsy.exe jnqnoqek.exe PID 1548 wrote to memory of 2480 1548 btgxbcuzsy.exe jnqnoqek.exe PID 4484 wrote to memory of 2872 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe WINWORD.EXE PID 4484 wrote to memory of 2872 4484 04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04542f267718e0a8555ce33cf08ea44e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\btgxbcuzsy.exebtgxbcuzsy.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\jnqnoqek.exeC:\Windows\system32\jnqnoqek.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2480 -
C:\Windows\SysWOW64\aermlnjnpwzvkhb.exeaermlnjnpwzvkhb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5112 -
C:\Windows\SysWOW64\jnqnoqek.exejnqnoqek.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2192 -
C:\Windows\SysWOW64\lfqattgnmuozm.exelfqattgnmuozm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2612 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2264 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5982d2e60bd19eaa7e5189738dffbb642
SHA1e323de3624ee37222861e8ab6da5c7fb9b3d9667
SHA256253e1f7995827802738cfc2cea3e65e4f24dc8841488fca4b5747a3f0191f4f6
SHA5121d90c9e6ddfe13129ed6090d2e7a82ff6db7c715f906cac7c193ef84567d61b2e9a6d7ed5a81a4c8bf67d7936e3e3958014eae9d03101e00e00dd44bb233658b
-
Filesize
512KB
MD59b4dd6c556cbc7985392886fca9c5575
SHA15ad93c2076ac031f083be42d704d5bf5c485a5e3
SHA2565ff7a0f818046dde97be7d76b04ad0d5e23ba37317be45bc5292602d09967532
SHA51280499df3e10dab7832a78a42c8744c2c7ad6d94dfb6928a1c8639124b2fc65e9a5dab9f8ea09b5b567a63bc3873b75457a2d2d74bb871420c6e1aa411d0a4be8
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5527bd5a91b7d45071059b9efd284a356
SHA17fb534994de2e77456336fd1fcd0ffce1ab07fdb
SHA256e7d0e7eb409b709ed39a856306de51a25a1ba1321eb6097bb4982c5578df50c9
SHA5127a18e0696d13a814aabaf3825e77dd0bb156cdb8fec868a6e120ae0d4856657fd780c45340da11b189bdabecf37d7b7c2eb84511ca57866fdbb51a54af4f96b1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5703fde0d4ced8d4354431be15dcb5f76
SHA1859bdc4b55459797a766984010d7098c7efd1c24
SHA256aa041d553c167455ef342743016a75a6eba006f00ca3cccb0a42fdcfeb0e4a5a
SHA51222c4dff7c5ffe0a23e3e38c122f98b9978a9e57b7e75ece0308db05373c9e507931d319a9feb83e9b220f4bacb7382b3ab0bed71fe7de3332adf0d686048a91e
-
Filesize
512KB
MD50b0bfbb213b3e941ffa48793c411f749
SHA1cc6ac48218f9c4863deb9ea8dca392905d3a5f31
SHA256f03271d4d8dfa7d9dcaa8057c2007b0f30853aecef2b5e80ca2f73b9721adf37
SHA512238fc8140594312c144fe9fad1bc8a689209acd77d4202388860c6f5f16e8b42b0ff9b1fe209a3e8302eda1cf25e5589e9dfa32a7b913c8723226aa09e2b3928
-
Filesize
512KB
MD57f54dde321107affe7183176cf12e32a
SHA1aa3005c827323d68637bd22d4c38d714dc82cd14
SHA256518e1b5309a4d33cc30f88c4a5843cb0232a3f282d65f76024ad781e674dbb72
SHA5128844767ebb2fbc94554d437317353b7288c71bb34937f292aa1af0a3fee09ad871ff3cc061470d69e1a84a10e383bc5afa981fb3d6b0b5911172823891d3ece4
-
Filesize
512KB
MD5b8c7246d07e5036ef094d0ec266d07d4
SHA14aaf04189f82153a2195b2af8e3dff52714c5143
SHA25697abd40104b82712fdc694ad98f69ea03058abe14f028f617367a4468509b7c1
SHA512acada5e34df2ef2673e75c1bf2e2c6f4a9c0719730a70d2177752a2251c7c5053deb05ba7e255dcd746d1bab33591b080a3dd2ae856ffbbf643abc5eeedafa9f
-
Filesize
512KB
MD5af1c7fa75e660ab2c06a574427e7f64e
SHA149200150ef5b319edc31c3d7dbb42a24ebc66aca
SHA256647e63ccdb127ade5b6c3f3657ec5bb8bf8b53051029e1b70a3db01b2ca18e6a
SHA51258f458b58163cba066d0a9c32c9dc32c27755eaf3bff977ecb08b346da13f8e07cc44a650edafeb831a92f705f8e7e52ac7e4ff4336fe164d57beb3c55b8f651
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5917f92718947bbf4dc52ee6913387b7f
SHA1c8e7f8b5f55015b162632a31dd343d1f52c305c7
SHA256a57fe8c0dca61ebf51b34307f141de48fa7e71fe6ddc2a7a649dcd7fb63ef1f0
SHA512bbb308dc6bb4067f90eb52400a7b82f05af41155b87bd290126edea53fdab924c8c236257db8c4c0bfb39ef83ffe747fd66ad651055e22cd7add9d959c26d30a
-
Filesize
512KB
MD5455048992d89a8beca332903d6135530
SHA1f970147115288913fef264e42852878f7a9dce4c
SHA2565f650936dacb9c1e28dd8efe97eda399c3da15c3eff437d0147a9a13b202fe45
SHA512e5a85f2f2d960fa1cceb5070f55016e78eae1f20a828b6d86edd6378f96a9a837ab457a106e284f3e6e18c792b6b255f6d90da7f07a9912ea82fb709f62585db