Analysis
-
max time kernel
149s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe
-
Size
512KB
-
MD5
052c5374e64f482cc2707fc2ecf4a678
-
SHA1
71e879e41f9817f2271e29296428807f911f8f72
-
SHA256
812d151c8495635d0171d6ea6c3a7b907a5c163290115baffe80a51672f0783f
-
SHA512
1e1103b9fe1ec12981f58f9ea82e02f89ce7e457306aebf7529ae2cad6ff5105fa6888a79af4f3d594298933c9e92899ddbc035a07894e421b4740b102cf5436
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6N:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bpxcpnggfg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bpxcpnggfg.exe -
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" bpxcpnggfg.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bpxcpnggfg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
bpxcpnggfg.exegrwegcenqsygmdh.exegarmgdaa.exeznbvbuaodbyrv.exegarmgdaa.exepid process 4508 bpxcpnggfg.exe 2880 grwegcenqsygmdh.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 2744 garmgdaa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" bpxcpnggfg.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
grwegcenqsygmdh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kioqzxtc = "grwegcenqsygmdh.exe" grwegcenqsygmdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "znbvbuaodbyrv.exe" grwegcenqsygmdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zdtexdim = "bpxcpnggfg.exe" grwegcenqsygmdh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
garmgdaa.exebpxcpnggfg.exegarmgdaa.exedescription ioc process File opened (read-only) \??\j: garmgdaa.exe File opened (read-only) \??\e: bpxcpnggfg.exe File opened (read-only) \??\h: bpxcpnggfg.exe File opened (read-only) \??\j: bpxcpnggfg.exe File opened (read-only) \??\s: bpxcpnggfg.exe File opened (read-only) \??\m: garmgdaa.exe File opened (read-only) \??\e: garmgdaa.exe File opened (read-only) \??\o: bpxcpnggfg.exe File opened (read-only) \??\i: garmgdaa.exe File opened (read-only) \??\u: garmgdaa.exe File opened (read-only) \??\z: garmgdaa.exe File opened (read-only) \??\b: bpxcpnggfg.exe File opened (read-only) \??\k: bpxcpnggfg.exe File opened (read-only) \??\w: garmgdaa.exe File opened (read-only) \??\m: bpxcpnggfg.exe File opened (read-only) \??\q: bpxcpnggfg.exe File opened (read-only) \??\k: garmgdaa.exe File opened (read-only) \??\s: garmgdaa.exe File opened (read-only) \??\y: garmgdaa.exe File opened (read-only) \??\s: garmgdaa.exe File opened (read-only) \??\y: garmgdaa.exe File opened (read-only) \??\a: garmgdaa.exe File opened (read-only) \??\p: garmgdaa.exe File opened (read-only) \??\u: garmgdaa.exe File opened (read-only) \??\t: garmgdaa.exe File opened (read-only) \??\h: garmgdaa.exe File opened (read-only) \??\m: garmgdaa.exe File opened (read-only) \??\p: bpxcpnggfg.exe File opened (read-only) \??\r: bpxcpnggfg.exe File opened (read-only) \??\z: bpxcpnggfg.exe File opened (read-only) \??\h: garmgdaa.exe File opened (read-only) \??\x: garmgdaa.exe File opened (read-only) \??\b: garmgdaa.exe File opened (read-only) \??\v: garmgdaa.exe File opened (read-only) \??\l: bpxcpnggfg.exe File opened (read-only) \??\v: bpxcpnggfg.exe File opened (read-only) \??\n: garmgdaa.exe File opened (read-only) \??\o: garmgdaa.exe File opened (read-only) \??\x: garmgdaa.exe File opened (read-only) \??\k: garmgdaa.exe File opened (read-only) \??\p: garmgdaa.exe File opened (read-only) \??\r: garmgdaa.exe File opened (read-only) \??\n: garmgdaa.exe File opened (read-only) \??\g: bpxcpnggfg.exe File opened (read-only) \??\t: bpxcpnggfg.exe File opened (read-only) \??\w: bpxcpnggfg.exe File opened (read-only) \??\a: garmgdaa.exe File opened (read-only) \??\l: garmgdaa.exe File opened (read-only) \??\t: garmgdaa.exe File opened (read-only) \??\y: bpxcpnggfg.exe File opened (read-only) \??\b: garmgdaa.exe File opened (read-only) \??\j: garmgdaa.exe File opened (read-only) \??\o: garmgdaa.exe File opened (read-only) \??\q: garmgdaa.exe File opened (read-only) \??\n: bpxcpnggfg.exe File opened (read-only) \??\i: garmgdaa.exe File opened (read-only) \??\z: garmgdaa.exe File opened (read-only) \??\u: bpxcpnggfg.exe File opened (read-only) \??\x: bpxcpnggfg.exe File opened (read-only) \??\g: garmgdaa.exe File opened (read-only) \??\v: garmgdaa.exe File opened (read-only) \??\g: garmgdaa.exe File opened (read-only) \??\q: garmgdaa.exe File opened (read-only) \??\a: bpxcpnggfg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
bpxcpnggfg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" bpxcpnggfg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" bpxcpnggfg.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3732-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\grwegcenqsygmdh.exe autoit_exe C:\Windows\SysWOW64\bpxcpnggfg.exe autoit_exe C:\Windows\SysWOW64\garmgdaa.exe autoit_exe C:\Windows\SysWOW64\znbvbuaodbyrv.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Program Files\UnpublishRevoke.doc.exe autoit_exe C:\Users\Admin\AppData\Roaming\ExpandUse.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exegarmgdaa.exegarmgdaa.exedescription ioc process File opened for modification C:\Windows\SysWOW64\znbvbuaodbyrv.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll bpxcpnggfg.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe garmgdaa.exe File created C:\Windows\SysWOW64\bpxcpnggfg.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bpxcpnggfg.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File created C:\Windows\SysWOW64\grwegcenqsygmdh.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\grwegcenqsygmdh.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe garmgdaa.exe File created C:\Windows\SysWOW64\garmgdaa.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\garmgdaa.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File created C:\Windows\SysWOW64\znbvbuaodbyrv.exe 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe garmgdaa.exe -
Drops file in Program Files directory 23 IoCs
Processes:
garmgdaa.exegarmgdaa.exedescription ioc process File created \??\c:\Program Files\UnpublishRevoke.doc.exe garmgdaa.exe File opened for modification C:\Program Files\UnpublishRevoke.doc.exe garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal garmgdaa.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification C:\Program Files\UnpublishRevoke.doc.exe garmgdaa.exe File opened for modification \??\c:\Program Files\UnpublishRevoke.doc.exe garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe garmgdaa.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe garmgdaa.exe File created \??\c:\Program Files\UnpublishRevoke.doc.exe garmgdaa.exe File opened for modification C:\Program Files\UnpublishRevoke.nal garmgdaa.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe garmgdaa.exe File opened for modification \??\c:\Program Files\UnpublishRevoke.doc.exe garmgdaa.exe File opened for modification C:\Program Files\UnpublishRevoke.nal garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal garmgdaa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal garmgdaa.exe -
Drops file in Windows directory 19 IoCs
Processes:
garmgdaa.exegarmgdaa.exeWINWORD.EXE052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe garmgdaa.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe garmgdaa.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe garmgdaa.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe garmgdaa.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification C:\Windows\mydoc.rtf 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe garmgdaa.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe garmgdaa.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe garmgdaa.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe garmgdaa.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe garmgdaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
bpxcpnggfg.exe052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bpxcpnggfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184BC67815EDDBC5B9CE7F95ECE534CA" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B12B449739EF53C9BAD632EDD7BC" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FFBFF89485D82689141D65B7D94BDE2E1365945664E6245D6E9" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0806BB1FF1B21DDD178D0D18A099167" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\Local Settings 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" bpxcpnggfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf bpxcpnggfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs bpxcpnggfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9F9CDFE6AF1E5830C3B42869E39E6B38E038C4261033EE1BA429D08A2" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg bpxcpnggfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33412D789D2183256D4576A570212CD97DF164DE" 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat bpxcpnggfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh bpxcpnggfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc bpxcpnggfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bpxcpnggfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bpxcpnggfg.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" bpxcpnggfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" bpxcpnggfg.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4620 WINWORD.EXE 4620 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exegrwegcenqsygmdh.exegarmgdaa.exebpxcpnggfg.exeznbvbuaodbyrv.exegarmgdaa.exepid process 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4984 garmgdaa.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2036 znbvbuaodbyrv.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2744 garmgdaa.exe 2744 garmgdaa.exe 2744 garmgdaa.exe 2744 garmgdaa.exe 2744 garmgdaa.exe 2744 garmgdaa.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exegrwegcenqsygmdh.exebpxcpnggfg.exegarmgdaa.exeznbvbuaodbyrv.exegarmgdaa.exepid process 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 2744 garmgdaa.exe 2744 garmgdaa.exe 2744 garmgdaa.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exegrwegcenqsygmdh.exebpxcpnggfg.exegarmgdaa.exeznbvbuaodbyrv.exegarmgdaa.exepid process 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 2880 grwegcenqsygmdh.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4508 bpxcpnggfg.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 4984 garmgdaa.exe 2036 znbvbuaodbyrv.exe 2744 garmgdaa.exe 2744 garmgdaa.exe 2744 garmgdaa.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4620 WINWORD.EXE 4620 WINWORD.EXE 4620 WINWORD.EXE 4620 WINWORD.EXE 4620 WINWORD.EXE 4620 WINWORD.EXE 4620 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exebpxcpnggfg.exedescription pid process target process PID 3732 wrote to memory of 4508 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 3732 wrote to memory of 4508 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 3732 wrote to memory of 4508 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe bpxcpnggfg.exe PID 3732 wrote to memory of 2880 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 3732 wrote to memory of 2880 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 3732 wrote to memory of 2880 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe grwegcenqsygmdh.exe PID 3732 wrote to memory of 4984 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 3732 wrote to memory of 4984 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 3732 wrote to memory of 4984 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe garmgdaa.exe PID 3732 wrote to memory of 2036 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 3732 wrote to memory of 2036 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 3732 wrote to memory of 2036 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe znbvbuaodbyrv.exe PID 3732 wrote to memory of 4620 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe WINWORD.EXE PID 3732 wrote to memory of 4620 3732 052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe WINWORD.EXE PID 4508 wrote to memory of 2744 4508 bpxcpnggfg.exe garmgdaa.exe PID 4508 wrote to memory of 2744 4508 bpxcpnggfg.exe garmgdaa.exe PID 4508 wrote to memory of 2744 4508 bpxcpnggfg.exe garmgdaa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\052c5374e64f482cc2707fc2ecf4a678_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\bpxcpnggfg.exebpxcpnggfg.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\garmgdaa.exeC:\Windows\system32\garmgdaa.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744 -
C:\Windows\SysWOW64\grwegcenqsygmdh.exegrwegcenqsygmdh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2880 -
C:\Windows\SysWOW64\garmgdaa.exegarmgdaa.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4984 -
C:\Windows\SysWOW64\znbvbuaodbyrv.exeznbvbuaodbyrv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2036 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5cd538103f3eb87bba24b1c7ab4576076
SHA1f35a473bd46866305b62f4b7604092c39f286d3c
SHA256c3215d1b825dad5369e7e223b2114766cb1a203c117d4a88b19ea6828e4d4211
SHA5128943c88f95430a76f1cce34333582a83983864f414e386a72bf1f32c24bd0e90eb9e004ae3529c04ca1b7f9a0ad98956c8951fb628f809c219ba4fd3d413acf0
-
Filesize
512KB
MD5c952b826741df86464962a827bb686f6
SHA1318ba237d5d70b29a558ca761f5112980881245e
SHA256f5b58078cfe4b61f9c061a0a57428b567ae5af98c56cabe673f15135cb577733
SHA512df0610f3211d6a51b21f850b13b697a9127528b833e0e5beb8ad118029956b1a865b38cbc169ad180bbbf858a359116f14d522a242e5cf068ae8f057ab9b0723
-
Filesize
512KB
MD5a2fbb13f6c7d44dd25b00bbc49e7fd04
SHA14fccc10aa3b1eb1995376f7754c4bdf687a51cf3
SHA25690c8d5a7c53d0e3a3e3cee7a9c6fba5c8fd4a8b64dce4076070e4225b1f16a82
SHA5120df73cac4df0702cdc59f1fc53ea0376ed6be283033e409ecc2230eb9753cc11896d915eeb3f9346dfa410fd732b686f7e46b468ce139df7d3a4331fcc4ddb23
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5140dc4f6ad97291304cfb63e460789b6
SHA1074b6da2b0f8205bc248bbc00d7e9c291c9b2ced
SHA256c4a7d511f5ba0816d29db8ca5217377404e5eb505ea6e8b7c0f44cb614b8610a
SHA5125db7c213d0c174beca39a97e5c5ac5446b85c498ac8393bfaab19148f2afd27ab7bd6a75b04256cad6ec82b0f96b6779480f2301c0524ab929bad61aaf8d66f2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5000e23fbeac766a2ba93d0b5953d0e9f
SHA136863c641d4c875078515c0ea662c7bfa4c82ea7
SHA256ab4008491ecc0aab86dba129e2ce448e6f78ed67d79b35b1c06c462431bbe623
SHA512638cf028820e216c0fa50ed34e1ceb1ab5541be4f9ac803b55645d5290a22716ebb4a38865a19d6da4636617037cbc9aa252eb80aed1c69d4ec18660bf0e8c2d
-
Filesize
512KB
MD5964af535058f0318eaeb1a482b70270f
SHA15bcf1afc09296ab94353ee2ca0bb48be774b3c8b
SHA256deecf56d4e5a6f140cfcf6589ee0b7a5431df146e1f1b20227edd987c8b1d20f
SHA512e2d37bef3a8b2ff8fd297db9969633250886aa2359c5d21063977704b5004ef01ee1ade67d3043af543a71ad369451c5e4c2a0351310f2c3860591ebce447e74
-
Filesize
512KB
MD5c80d8d5305d3421e68c15240519c63f0
SHA1342eda0c5121d44cae3e0bba43065b46c6817f3b
SHA256ba77b16ff29cbace5a1eeca89d077a2fc3d8adfd1007735307f03f2e4aab776b
SHA51237cf61cafbcb23c6dcbc93af7194e6fe924fcfae8771c07dc0f6da01e42c99207fc41e8d08b776c700f87c3ef5c0822c3f57ffc76989e1a62623d32da1f636c3
-
Filesize
512KB
MD541c3697de8caa89cfc22eb00ec9a119b
SHA14299105507afe1120dc85a52ba282f9e1a848042
SHA256dab683f20028267fa49ff649b025b7b6c1596f9b9ac97a5dac3f4458bc06a16a
SHA512e3f2ee3304c9550ec480ba1551aa7d33f25cb1ceed17edc683c69b327d0b025242138514debd314ad688bdb42924490614dbb51add8430df7c73e9fce78e4c94
-
Filesize
512KB
MD57cb74b1022629e4e643e2e68f8f7b33b
SHA10d712439c7a11e2bd288236658f9c13cd902e0fe
SHA256f5f5bf5558fd7e22fe687762bf2a15155f05d4717bbb9e47fdb7c1ef61456f10
SHA5122add471b57bad282aec8f84d169193b633fd8f6d30562e32c63dbff1eb3f062fba76d73479fdf2a4fddf5fd13db92ba2d16dbc58d5f772f68e68b436ea873d14
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5432ae1849515056282f0187f62b446e4
SHA15041b89cac717fa7ff8293897a97fed059ccf120
SHA256b648abe51b87c6cb7fc5a1113351f07cfde026b3b2e3466ca001c72063358a86
SHA512749f86afc466e5410d8ab40c0bf61e44a6dec71a094216cc91bca8841179beb2ef3d0a4d2e495060b53233204bc28c9fbdba60f3cbfc43ddbd749e0a8ffe7dd7
-
Filesize
512KB
MD505e6b23d4ed1820ff58f7d107e31d3e7
SHA1b87af02030e497b5f42bed0817c43da3a32aaba1
SHA256c42e93f7bea47f086989b0b7cdbb4f9e4bc6b1afde966b8630ce814604eda862
SHA5128c4020080dd3772827de9256f695ab7e0a3259e6542cb185277304a1c248479d502adf424abbfd63ccf068cf382a1ef2bf78886861b949b70f55387af093e15d
-
Filesize
512KB
MD53c4c4d98457251cd4df22ab4aaed3b5d
SHA1a1d4331ae9041d77c09cb4d575750634accc0f93
SHA256559d0ec5bab3eb4f5a39dba13814039507d082de7dc1106bf940342cc95fb513
SHA512c94fdee31bea5a35074f6667e8a5ac313eb77ef3b78730594c3fbeb06a8239858daa9c603fc81c4521458518a14f6c6d20038948e26088372f2162cae8a9ff2e