Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 20:08

General

  • Target

    05f8c3a1ecea0c3b115e4d6fd4beb6a7_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    05f8c3a1ecea0c3b115e4d6fd4beb6a7

  • SHA1

    263ae7765ea9c118042ff4f6364a7fdb9e3aad34

  • SHA256

    9c1666e9dbc1884a056d79e7271e449e4b3e873e21c5ecdd18a0f559da81a064

  • SHA512

    28b26667018dea51285174a070ff0b0c7989b6d098cfb73f7aa0ac9c0c46ccd61de928523e3fd989af7be326505dc5a530cc1a85de784802cbc206536621b6ea

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6R:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5g

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05f8c3a1ecea0c3b115e4d6fd4beb6a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05f8c3a1ecea0c3b115e4d6fd4beb6a7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\eebjltfncl.exe
      eebjltfncl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\ikbkqtit.exe
        C:\Windows\system32\ikbkqtit.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2200
    • C:\Windows\SysWOW64\cckikonyicfzgsq.exe
      cckikonyicfzgsq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2700
    • C:\Windows\SysWOW64\ikbkqtit.exe
      ikbkqtit.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2536
    • C:\Windows\SysWOW64\wzkjazeplfuzq.exe
      wzkjazeplfuzq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2720
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1580

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    7
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      36c081bdeb3ab1d42ab27f41592eea19

      SHA1

      e757c367f8c798c8d75f26aa9569ef382a29aaa8

      SHA256

      78333bac77878eea2173a53836d76e4d6cc3b6dfda7fb84652b6d429ade347f5

      SHA512

      eb39443d54e33c0f9ad8644e085b2d15040307d946db280eee07f9f2b53c301cce4a8605b88ef751fd7394fe7c131f4b9d7d2e16b145102466f2d9c59860ebc3

    • C:\Windows\SysWOW64\cckikonyicfzgsq.exe
      Filesize

      512KB

      MD5

      c1e6b01cdc013e99f8e8af9d9239d372

      SHA1

      9170f21678fd459168c1c5849ae55a76bd6d7317

      SHA256

      00307811d5d310fb85bca3e01051cf2bbd8da31fd07912ff83b9bc8ba68a83d6

      SHA512

      f549f25181ec5b575e2c8c79fcf3f246c77489f1afdff88d46cdd7ca1174a0611d3798abf32aa60e4ddba6ca63a57b32dfaecabcd3c7882a0f7cc6f2927629d2

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\eebjltfncl.exe
      Filesize

      512KB

      MD5

      716d0dc2e8b09c1080cea09f27839227

      SHA1

      5316c352218cda22034f24326fd03c0b35729b02

      SHA256

      f4841e1be92c6f795423b9e64bf3c94208a4e3925f720d607794138a065c3435

      SHA512

      1578b5d2bfed0bca9ac9edacc36a78f337c867cbb231fd3a83cd5d1dff7f0f78f155be33cbcee25dd8dfa57d334d3259b47fb4308669fe9f0b15ae2bfbe94fd0

    • \Windows\SysWOW64\ikbkqtit.exe
      Filesize

      512KB

      MD5

      c6b0e32bd01cfd0819c54558fe9ce122

      SHA1

      8f239e1db12b23e6f7507128cb27f0499a53a356

      SHA256

      fc8f8bad7b8a803302f839c4a0f0f628131b60fd8c10c11c38566872dbd33948

      SHA512

      06bcb5d61ce3354234ca0e2e655a596f50ac011548717434efc0eb0437c7fd437ef1e09c00e62a3f55543c96634534ea87437f4fed08146ecaef4358edf60934

    • \Windows\SysWOW64\wzkjazeplfuzq.exe
      Filesize

      512KB

      MD5

      18d233a52d6ce482656843f11b51699c

      SHA1

      e500b98a6dce243f5c8c51877a801883dc20bdea

      SHA256

      818a9251242d23cf59da43955f89201897c8fe716da45104439fb207cd59e603

      SHA512

      b3cb26f6f1db416614c8f12eef47545fc7e9a335da9c2c2760336eda03d9cd72a6180348d3b4026c4b6020484535f6567cf6cf201a3f677c840b54d8f9b97e0c

    • memory/2456-45-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2456-92-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2484-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB