Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 13:56

General

  • Target

    055735e29b5b10f70534747b4728f0e0_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    055735e29b5b10f70534747b4728f0e0

  • SHA1

    9f532602425f9055a1ce843a141b1a8576c00a6d

  • SHA256

    e5ce80ae6335e3de4780105efc6f0f92085fd34ebf91d33995128fb5890ac605

  • SHA512

    764cca2c2c9cf312a4d30e0661d0091e46ed3e357561eb10c48cb81d079e1740ab6e863f0440734d1d7e2db19a2ba683a941bf22b2c46b203c7cab567dc09135

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5T

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\055735e29b5b10f70534747b4728f0e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\055735e29b5b10f70534747b4728f0e0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SysWOW64\hyzvyixugu.exe
      hyzvyixugu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\SysWOW64\ymflyivc.exe
        C:\Windows\system32\ymflyivc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5420
    • C:\Windows\SysWOW64\ybxwotoeximypbd.exe
      ybxwotoeximypbd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2900
    • C:\Windows\SysWOW64\ymflyivc.exe
      ymflyivc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3184
    • C:\Windows\SysWOW64\riiykdhfvbqgu.exe
      riiykdhfvbqgu.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4692
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5760
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3916 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:6048

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    6
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    4
    T1012

    System Information Discovery

    5
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe
      Filesize

      512KB

      MD5

      339b1ea198bc1867ea1abb71ae29f364

      SHA1

      347467dac41b9972efbb7e80cb1fb60c2274d699

      SHA256

      2bb2bbff9b65230932eaae85428534d84f988eb9bacbc3d35ada185b65383ee3

      SHA512

      751893e2a0cddaa329bfdbaaf16f12a033469f7944c4168b72938f40b85a40ac21184e0b6383c10077e0b477ade424b7a09503a3393048e21535ce337b206649

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe
      Filesize

      512KB

      MD5

      6e24cac8eaef71cdc220b5ec86a11ffc

      SHA1

      bab6facdc484d8ffef6a0194342087baa84520a4

      SHA256

      ba0c89fcd9393a0874fd74c8920a962d280667dd4fb4947f41746878baec1783

      SHA512

      8aaadcd134c3a7b86483e56d82e639b30c1f6193d311a7c922f585c224adcca071a98bc17ef38d9a1cc48727552b79d1f901b97e8bb4393803904863abec1f5a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
      Filesize

      3KB

      MD5

      7283dcdff55ed7e5b8b55e6e3fbf6aac

      SHA1

      19718b8fd9ad83abf9e229c8b9351824c339452d

      SHA256

      132a3fbd2cd6349d150a08f0217de4ae1b897c1b5909df93408fccc136a5266f

      SHA512

      1a8e50bc8de90bbdd93fa236784bab2813ca6dd5ae065e4086a29f4e3dc2e3263f085f9ae95a36aa86f102f018394226f90c0593c86c2490f51f401f793584a0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
      Filesize

      3KB

      MD5

      d781388618c1109e8c29db8c644d7116

      SHA1

      457ec20c51700ac2b71fa1514b94920f218c7a4d

      SHA256

      8432ed797ffa907df5698cfecfa95e99264b8bdc1a5721b21709d1999bd8f877

      SHA512

      5a1b6e1a4ddd37e526b2060c337ac45ef2886cb8fc681373fba5a18700e7c05b9d7d4803b3b33fbf2b68d4bc5a8cb6cbe494a155249b9716f44b32864c15f87a

    • C:\Users\Admin\Downloads\ClearConvertFrom.doc.exe
      Filesize

      512KB

      MD5

      fae2149c6aa808ebe0de89ecff310971

      SHA1

      c332bcd0cd898fdfbff9683dccca09fd39fad960

      SHA256

      533fca707dc4b9a186e3e9126d3dfee97208bbebe23ddee65cc401ef4453c911

      SHA512

      beb86afb23888c2f8f213c070a9cf3dab7adf787973253cf466ac8647986b2642b0cadf8ca427b9b988c13c4e2b96a34f1627acd90dcfb45afd7f9e4705bfa82

    • C:\Windows\SysWOW64\hyzvyixugu.exe
      Filesize

      512KB

      MD5

      fa42b5e4afa8802d96b1478aa7bc5c79

      SHA1

      404c1248d9563e3ad3a49698d21c48c4713c69e9

      SHA256

      4f311fcaf0d6752e9976f1e8d4155ed8f8491830b06b41ee14f794d9abb18dbd

      SHA512

      f7ba38b4e8f99fbd924a759600e49b1c28ee85f2e381d1d82e001777199fec899ba933628135a0324e2d891cb1a5ebfe4111d0f7fdd337f8c839fa9c5864be88

    • C:\Windows\SysWOW64\riiykdhfvbqgu.exe
      Filesize

      512KB

      MD5

      1f4d817f9c2409a96d1963b2643e865e

      SHA1

      9bd1c7b2a57397da475d000b495bd97dd7d0f1a4

      SHA256

      f6cd758e1b50362b7330f6096e8cdadc225e38d72200b94d5c7643df3715917e

      SHA512

      1a792c17cf98dda98100a9fab345f64b7d5798a14c4de056d93e28e02a445b1049cf5304872d327e505cf647e5f9527df8aaaadba71fcac0a93be52c177779c8

    • C:\Windows\SysWOW64\ybxwotoeximypbd.exe
      Filesize

      512KB

      MD5

      82bb22b16e9007d238efb02479ab8e66

      SHA1

      75a0f381f8a3a97d883b41b3633c8c6a053ff0a2

      SHA256

      07d7c4cf5a105578fe214d5febc02a852466e867e0e97e344a11c14ec4f98d67

      SHA512

      7551358a550d20609fbef2db6c25546e2359d2ee816d590c5edc8136c935ab0e5fc08895c32e551ef1383bb9170ea2721d78af3d5558862c29d0c038abf8f949

    • C:\Windows\SysWOW64\ymflyivc.exe
      Filesize

      512KB

      MD5

      7b0735228ce97f1b2cbe270e3a050feb

      SHA1

      31c6a424be622424bedb16ca3fbb4cca733ccd13

      SHA256

      ea6364061892f290f65030e96881bb381c37ed5efab72dfe9c4a3337068da218

      SHA512

      312c7a5a8f62618d8caab6b2cf93bf31aba253eaff4cfb193119680d4706c7dcc364d8afb748bfa01bd0c4bbbf93c434acca69cf8bf0634b428ef1d75430e02a

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
      Filesize

      512KB

      MD5

      0dc8e06a23844f827c63e036c08b1120

      SHA1

      1ccd85a77ca3a52316cc684e5032b6e1c06df3e1

      SHA256

      5186ad6ce9ded6bcd39c778ac11ab24b91e0e6099202b286a45265925e665661

      SHA512

      da3ac90e03e8d70037f5c454c0705fa25e5e8b6aebd4d49e07e3618e347cf6ddab692126b6f045ef0f15d2757d35fc60a855eb3888cb7097694d9605ad23e094

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
      Filesize

      512KB

      MD5

      09e49d5ec61ffd2403e9be724944b43c

      SHA1

      fa00ce6206df17554bfab207628d7477a755655f

      SHA256

      a8ad3f8c806d0f38aa5ccd3a516d2656bb3a5f4af4e455eec20dff7e6d5196d7

      SHA512

      c24f4364aeced4c85cb7fed8ec94587604a0953b85bdd260ac41824cdbde1fd8d96ba5fa2ab157547abbb885897cdc115235b2f97d6c8920f9105d6d2179122e

    • memory/4620-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB

    • memory/5760-43-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp
      Filesize

      64KB

    • memory/5760-42-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp
      Filesize

      64KB

    • memory/5760-41-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-40-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-39-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-37-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-38-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-122-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-123-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-125-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB

    • memory/5760-124-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp
      Filesize

      64KB