Analysis
-
max time kernel
150s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe
-
Size
512KB
-
MD5
05f1a6f2b37aab8a86235cf3dfb4d535
-
SHA1
edb8e86bbc0aa9e5bdc25899772b381abb31bc99
-
SHA256
d4e6a7f307f0f6b685dd293054dd2f6e51a0acaf7f59fb8c577a886b407b30a2
-
SHA512
f57605db01d72994b926c1aeb011591fcbe9635799b34425a1f8e7db0f39ffc5a5a602bf099acb21d6295cc43018f489c049a891019e3b538f4e80ef4cfc9183
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6k:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5d
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
xrikfexfpo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" xrikfexfpo.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
xrikfexfpo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xrikfexfpo.exe -
Processes:
xrikfexfpo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" xrikfexfpo.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
xrikfexfpo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xrikfexfpo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
xrikfexfpo.exeybnxoashtthulvf.exepfvfcwnp.exejoqjihhxqlgef.exepfvfcwnp.exepid process 2124 xrikfexfpo.exe 4188 ybnxoashtthulvf.exe 3788 pfvfcwnp.exe 3016 joqjihhxqlgef.exe 4468 pfvfcwnp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
xrikfexfpo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" xrikfexfpo.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ybnxoashtthulvf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mowhzcmc = "xrikfexfpo.exe" ybnxoashtthulvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xdisxnzk = "ybnxoashtthulvf.exe" ybnxoashtthulvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "joqjihhxqlgef.exe" ybnxoashtthulvf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
pfvfcwnp.exepfvfcwnp.exexrikfexfpo.exedescription ioc process File opened (read-only) \??\u: pfvfcwnp.exe File opened (read-only) \??\b: pfvfcwnp.exe File opened (read-only) \??\j: pfvfcwnp.exe File opened (read-only) \??\w: pfvfcwnp.exe File opened (read-only) \??\j: xrikfexfpo.exe File opened (read-only) \??\z: xrikfexfpo.exe File opened (read-only) \??\x: pfvfcwnp.exe File opened (read-only) \??\e: pfvfcwnp.exe File opened (read-only) \??\l: pfvfcwnp.exe File opened (read-only) \??\v: xrikfexfpo.exe File opened (read-only) \??\b: pfvfcwnp.exe File opened (read-only) \??\j: pfvfcwnp.exe File opened (read-only) \??\a: pfvfcwnp.exe File opened (read-only) \??\g: pfvfcwnp.exe File opened (read-only) \??\n: pfvfcwnp.exe File opened (read-only) \??\a: pfvfcwnp.exe File opened (read-only) \??\p: pfvfcwnp.exe File opened (read-only) \??\i: pfvfcwnp.exe File opened (read-only) \??\x: pfvfcwnp.exe File opened (read-only) \??\h: xrikfexfpo.exe File opened (read-only) \??\o: xrikfexfpo.exe File opened (read-only) \??\p: xrikfexfpo.exe File opened (read-only) \??\i: pfvfcwnp.exe File opened (read-only) \??\y: pfvfcwnp.exe File opened (read-only) \??\g: xrikfexfpo.exe File opened (read-only) \??\i: xrikfexfpo.exe File opened (read-only) \??\s: xrikfexfpo.exe File opened (read-only) \??\z: pfvfcwnp.exe File opened (read-only) \??\k: xrikfexfpo.exe File opened (read-only) \??\t: xrikfexfpo.exe File opened (read-only) \??\o: pfvfcwnp.exe File opened (read-only) \??\r: pfvfcwnp.exe File opened (read-only) \??\y: pfvfcwnp.exe File opened (read-only) \??\a: xrikfexfpo.exe File opened (read-only) \??\k: pfvfcwnp.exe File opened (read-only) \??\l: pfvfcwnp.exe File opened (read-only) \??\w: pfvfcwnp.exe File opened (read-only) \??\u: pfvfcwnp.exe File opened (read-only) \??\r: xrikfexfpo.exe File opened (read-only) \??\m: pfvfcwnp.exe File opened (read-only) \??\q: pfvfcwnp.exe File opened (read-only) \??\p: pfvfcwnp.exe File opened (read-only) \??\t: pfvfcwnp.exe File opened (read-only) \??\b: xrikfexfpo.exe File opened (read-only) \??\m: xrikfexfpo.exe File opened (read-only) \??\e: pfvfcwnp.exe File opened (read-only) \??\y: xrikfexfpo.exe File opened (read-only) \??\g: pfvfcwnp.exe File opened (read-only) \??\t: pfvfcwnp.exe File opened (read-only) \??\u: xrikfexfpo.exe File opened (read-only) \??\x: xrikfexfpo.exe File opened (read-only) \??\s: pfvfcwnp.exe File opened (read-only) \??\v: pfvfcwnp.exe File opened (read-only) \??\l: xrikfexfpo.exe File opened (read-only) \??\n: xrikfexfpo.exe File opened (read-only) \??\m: pfvfcwnp.exe File opened (read-only) \??\o: pfvfcwnp.exe File opened (read-only) \??\h: pfvfcwnp.exe File opened (read-only) \??\s: pfvfcwnp.exe File opened (read-only) \??\z: pfvfcwnp.exe File opened (read-only) \??\h: pfvfcwnp.exe File opened (read-only) \??\n: pfvfcwnp.exe File opened (read-only) \??\k: pfvfcwnp.exe File opened (read-only) \??\q: pfvfcwnp.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
xrikfexfpo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" xrikfexfpo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" xrikfexfpo.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1960-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ybnxoashtthulvf.exe autoit_exe C:\Windows\SysWOW64\xrikfexfpo.exe autoit_exe C:\Windows\SysWOW64\pfvfcwnp.exe autoit_exe C:\Windows\SysWOW64\joqjihhxqlgef.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exepfvfcwnp.exepfvfcwnp.exexrikfexfpo.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ybnxoashtthulvf.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File created C:\Windows\SysWOW64\pfvfcwnp.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pfvfcwnp.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pfvfcwnp.exe File created C:\Windows\SysWOW64\xrikfexfpo.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File created C:\Windows\SysWOW64\ybnxoashtthulvf.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File created C:\Windows\SysWOW64\joqjihhxqlgef.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\joqjihhxqlgef.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll xrikfexfpo.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification C:\Windows\SysWOW64\xrikfexfpo.exe 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
pfvfcwnp.exepfvfcwnp.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pfvfcwnp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pfvfcwnp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pfvfcwnp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pfvfcwnp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pfvfcwnp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pfvfcwnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pfvfcwnp.exe -
Drops file in Windows directory 19 IoCs
Processes:
pfvfcwnp.exepfvfcwnp.exeWINWORD.EXE05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exedescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pfvfcwnp.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pfvfcwnp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pfvfcwnp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pfvfcwnp.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pfvfcwnp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pfvfcwnp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pfvfcwnp.exe File opened for modification C:\Windows\mydoc.rtf 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pfvfcwnp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
xrikfexfpo.exe05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs xrikfexfpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" xrikfexfpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg xrikfexfpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" xrikfexfpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh xrikfexfpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" xrikfexfpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2ECBB12C4493399D53CDB9D5329BD4BF" 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FC6BC1FF1A21D0D17AD0D48A749110" 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1948C6751590DBC3B9CC7C93EC9434BB" 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat xrikfexfpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf xrikfexfpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32322D7A9C2083546A4376D5772E2CD87C8E64D6" 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFF884F58851B9131D72F7D9DBCE5E633594B67406344D7E9" 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" xrikfexfpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc xrikfexfpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" xrikfexfpo.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBCFACDF963F291837F3B4081983999B38B03F04360023CE1B945E608D3" 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" xrikfexfpo.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1928 WINWORD.EXE 1928 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exexrikfexfpo.exeybnxoashtthulvf.exepfvfcwnp.exejoqjihhxqlgef.exepfvfcwnp.exepid process 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exexrikfexfpo.exeybnxoashtthulvf.exepfvfcwnp.exejoqjihhxqlgef.exepfvfcwnp.exepid process 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exexrikfexfpo.exeybnxoashtthulvf.exepfvfcwnp.exejoqjihhxqlgef.exepfvfcwnp.exepid process 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 2124 xrikfexfpo.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 4188 ybnxoashtthulvf.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3788 pfvfcwnp.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 3016 joqjihhxqlgef.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe 4468 pfvfcwnp.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exexrikfexfpo.exedescription pid process target process PID 1960 wrote to memory of 2124 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe xrikfexfpo.exe PID 1960 wrote to memory of 2124 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe xrikfexfpo.exe PID 1960 wrote to memory of 2124 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe xrikfexfpo.exe PID 1960 wrote to memory of 4188 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe ybnxoashtthulvf.exe PID 1960 wrote to memory of 4188 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe ybnxoashtthulvf.exe PID 1960 wrote to memory of 4188 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe ybnxoashtthulvf.exe PID 1960 wrote to memory of 3788 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe pfvfcwnp.exe PID 1960 wrote to memory of 3788 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe pfvfcwnp.exe PID 1960 wrote to memory of 3788 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe pfvfcwnp.exe PID 1960 wrote to memory of 3016 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe joqjihhxqlgef.exe PID 1960 wrote to memory of 3016 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe joqjihhxqlgef.exe PID 1960 wrote to memory of 3016 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe joqjihhxqlgef.exe PID 1960 wrote to memory of 1928 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe WINWORD.EXE PID 1960 wrote to memory of 1928 1960 05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe WINWORD.EXE PID 2124 wrote to memory of 4468 2124 xrikfexfpo.exe pfvfcwnp.exe PID 2124 wrote to memory of 4468 2124 xrikfexfpo.exe pfvfcwnp.exe PID 2124 wrote to memory of 4468 2124 xrikfexfpo.exe pfvfcwnp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05f1a6f2b37aab8a86235cf3dfb4d535_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\xrikfexfpo.exexrikfexfpo.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\pfvfcwnp.exeC:\Windows\system32\pfvfcwnp.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4468
-
-
-
C:\Windows\SysWOW64\ybnxoashtthulvf.exeybnxoashtthulvf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4188
-
-
C:\Windows\SysWOW64\pfvfcwnp.exepfvfcwnp.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3788
-
-
C:\Windows\SysWOW64\joqjihhxqlgef.exejoqjihhxqlgef.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3016
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5715c1dced598c78289076c3470338039
SHA1b7d9b546f359d749f8b5fcff754007e82f11e901
SHA256a0608ecf0cf753044546616d770f41bb602be2205699fe2e7f32c745e0e551a6
SHA51228aec6063d39068118a4d5314f085fd86ddeee8d8a797d7552c920065e1607ebb9af287d030e458ffd37b1849c76f778bfd279efd92b3f9303aeef06a78ad461
-
Filesize
512KB
MD5eb5405d7081289db2a265e15ea2c6f7b
SHA167639878176a6ca093dd732558445f24f8e0b95b
SHA256d2366abd3b380bcbc979bc7308788504175beac9f59d89a230164de88c65b589
SHA5123857707c62a7743e7184b6fc2b69c1fb9ef5f1738aa06b5aadb1b4cd0479a3cb6cd1e9b094bd452476ed69615a5b509129411ba9fa80280bf053c5855c0addea
-
Filesize
239B
MD5557e218b0e20780b3cd82e427f86aa29
SHA163f5b2cb9bf3348d1553bec38764a8fb6a78b9aa
SHA2563fc1be08067e63dd4be396fedda4558fa1b73824b18ab71fee42fece19c402df
SHA512baa81f48536d3f518652d81615825b086a0d78f6aa2af4b08f1537fe75929c2cd275a14efd4f3f74786c29eca9b94000cdac8cef23389f6c670d3908455fc79c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59f8aa0b59e4e96108d3109cfb1a41400
SHA1ed69340b8d75c0a8aed333b2460f92fcc1b03bac
SHA25661efc757d7c99b64d67d51c0e9d1eeaad78e4b7c9b325bea3d2d7de1772f6ec1
SHA5122835a5b0b972859eef64abca71f5d17467b63fd4020b868605097d711c69dd68a8f03957ff022dc33716b9c10a627bd8f50f57c6bfa598c0384c0dd9c7fab842
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5e424a54bbafc04f04c21b5386f8bfc24
SHA1932fbc3494b7e373e51805db1be7494496b0257c
SHA2566ff7597e5779bc0c71e1961482cfb11f901dbb941d1a49c5c4284f607357a433
SHA5121ce6ae331a413b7e6ebd9523a037796c21bd43417fb2893ea9edfbe6ee54db34d092c8d1d3c6920a328215c7c7ea9cb5f696849bfea4321eb36bf11b67280b51
-
Filesize
512KB
MD57fbf67a9e6dc2f913094fc2180bcf0b9
SHA1d068509e37126e9e2b8024cfa86b41870d693d58
SHA256290f05015aae7535ce16cfc997713ccc41ae030ff917453c4fd2383ebaec4bdc
SHA512993880fd1811dce414ec573cde2dc066294cd252c9672f92b5bcc430d02d864c6d749fd2e3b974177e8a23c2553852637e5e5aa6d5599a1fba4ff565687dc414
-
Filesize
512KB
MD59b8ee0b5ddc1ffb03e752ba2f4e4f889
SHA1195c7be12b76e2fbf79bdfe5ff3696377b304dc9
SHA2565afbaa0e45cfb4c0b4c10a04f82bcc6e43153f7a061f3542f1518f54b4e35d31
SHA512b641b46dfbca1de245e0b128633ba91a2d0ac179c229715c6f4e1ce03bee17ad048db206b79e0444ba2b6e84304a74c9563a3deaa8cf730dee943faa7b4d73c9
-
Filesize
512KB
MD5f5c895adf7e2de2b1a0c1d5c297c3078
SHA1c3fca0ce367836264ffc9758b650258f1f34c1a9
SHA256f3dd382b4b8f5b55ab2bbf86adeb89b7ebb92614c778ebadd0af5e03ba79a263
SHA5129ec80956b7693f4c9f52b61c8dedc3911080146e9a36057c74c9d144a472509c130dc6c21707bc3962af923ee043d41410b704eb9962c3daf8dc6c4b01d1760f
-
Filesize
512KB
MD508efe140cafc902abc265f5e31e9738b
SHA13b80933d669097f0741f1f0501a0a36cd5496491
SHA25692f71ddb5cfa88c186e113ac2c6c67e3c7e8eb280f6ca18109697fb2a8948bb0
SHA512de055424995f39a06d31c5d2fdba0ed4da91cf082fb67c2f1d09efb74d36a2e3efba46a856cd3da4ad702de80a082ac909884e56be13bd794d801b37b07eac45
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD56d14163625d3dfbde36c12937a292495
SHA13dda1c074f346169b3f28176a85c1c38e1f81fd7
SHA256870baa2671ad911c9bae51c028baa7e41a4593be26848a0e95161f84c69ad40f
SHA5122cb08d45f09b12ea59ee064b75a73b9bf9006bb5b70b789821d67a4c70a56371487fa9d839cbc974938278d7342bdba28c26ce21bc5b6465a359e134ebe057ed
-
Filesize
512KB
MD5ccde7f5190f113e77caf61a9702307ba
SHA19565faad9694f5b5104024edd40786acd090d377
SHA256818a87d103fbc85a2c1049965c202597ce68da3619ec7f424d3cb8d48a0a02b1
SHA5121f2d3aef009041e1679b843892a78bd64145d4db172039c0c00bc44652fca554f6ce816e7bcf8a70ca896061add5f4d2e816da8ba2d49538f18b426b72c30d38