Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 20:08

General

  • Target

    05f8c3a1ecea0c3b115e4d6fd4beb6a7_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    05f8c3a1ecea0c3b115e4d6fd4beb6a7

  • SHA1

    263ae7765ea9c118042ff4f6364a7fdb9e3aad34

  • SHA256

    9c1666e9dbc1884a056d79e7271e449e4b3e873e21c5ecdd18a0f559da81a064

  • SHA512

    28b26667018dea51285174a070ff0b0c7989b6d098cfb73f7aa0ac9c0c46ccd61de928523e3fd989af7be326505dc5a530cc1a85de784802cbc206536621b6ea

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6R:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5g

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05f8c3a1ecea0c3b115e4d6fd4beb6a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05f8c3a1ecea0c3b115e4d6fd4beb6a7_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Windows\SysWOW64\eebjltfncl.exe
      eebjltfncl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\ikbkqtit.exe
        C:\Windows\system32\ikbkqtit.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1900
    • C:\Windows\SysWOW64\cckikonyicfzgsq.exe
      cckikonyicfzgsq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2980
    • C:\Windows\SysWOW64\ikbkqtit.exe
      ikbkqtit.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3040
    • C:\Windows\SysWOW64\wzkjazeplfuzq.exe
      wzkjazeplfuzq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4788
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Modify Registry

6
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe
    Filesize

    512KB

    MD5

    1c3725e35a82386d45b42cc8be355005

    SHA1

    d0d582974998fad90e57a7c7ec97529e7a7cbbe8

    SHA256

    f79c46ab6298790b8712e4e50ae0c07cdfee3e922a80835215f10e747cfbec93

    SHA512

    bdaf89dc4c83eb0e03178be6dead633484d4c0da62527e787767a4684e4963f2586b0bca2c4805d6fe24987cae7df2f4fec45ed015629ae066caea46487f0a42

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe
    Filesize

    512KB

    MD5

    9b7142d4bbd46bb0df0969a544061c94

    SHA1

    8a335897dc84d88e9c15fdebb56548229b5bcafa

    SHA256

    14dfccf7178a61aa996f365742f60e7ad504a131e62b2a36d9ee3394a18fdbc6

    SHA512

    eb1b215c8595ce6bf7fc7e6b3dc9323badb7e60efd5b1d80c4604bdc0b52da2d5a00ea6df05c6cdaba61ffd5d235cd640eb6ed9949813645e04fc3eb92121bcb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
    Filesize

    3KB

    MD5

    61fbe341d6681d9b303b35b5a724ab45

    SHA1

    74a387e13c1e5aed36b81955129f82ded6b8b3da

    SHA256

    f75d997cb2a8e20cd8d27b00dc61495b63aa2cf17190415c56a41a1250041420

    SHA512

    f4c7ab812b8da8052305254254ae58aa4a910bb3a690790127154fd6fbc1d93df9e5fffce8e3f352925e493e6bd4d0e5b60a753add2013c5734a880ac3ae6443

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
    Filesize

    3KB

    MD5

    761a695acf8e47aae0cb3538010b1d1b

    SHA1

    6b573cda3fbaacaa82e856c6c3dc3452433bda3b

    SHA256

    eaec485c8cf171f22300e7868f5d6f2f4974b46db67ce276a0567343e5097462

    SHA512

    206ea8988587d8e261ab8205187ad10078b5ae4c507285193b4c273d62777806dbb65a36ac424ab95919494955dd968be9bccfe60362e130bf26e6c5673e66f2

  • C:\Users\Admin\Documents\ReceiveRepair.doc.exe
    Filesize

    512KB

    MD5

    4cf6f1f0c70f71c9e9c6a8742cd669b1

    SHA1

    54cef166794916fb080ca35245f1fae3d89cf6a5

    SHA256

    6996728445ed210e2ae830db93131da217fceaf834036855c306a532322a6553

    SHA512

    0ada3b4eacf49f63eb725e21426feea08871bbeafd7bb51d475f77e13de77409867a202946ab978ecf144c14181b33d41351d7f4409efbcd482798bd0f25f39d

  • C:\Windows\SysWOW64\cckikonyicfzgsq.exe
    Filesize

    512KB

    MD5

    eba3fe3d3b66ea0753a3cd08f76eb35b

    SHA1

    83ee69a243ccf5a182943bffff71e7b572bbd845

    SHA256

    501c8cde899060b2929ca8720925352577c8b98a0637817f3deebe004aaf1f86

    SHA512

    926ba32ba9a86ccc2268749b69558c8e4101cca126d8003f0cb617a38f5f3718e02b0f84162b15272251dabb14b5e527a5389c3deaed48d3ab5ddac785b1957c

  • C:\Windows\SysWOW64\eebjltfncl.exe
    Filesize

    512KB

    MD5

    0f0b94186353f26cfe21178138b5f8fd

    SHA1

    ea8985eb085f836a27f7c097ff38ecf3e7ea96bb

    SHA256

    1bfb18d642dbb423cde28e8af232cb43cdafec7fc0e2f91fbf46099760f72532

    SHA512

    d24c5cc314d3f2dc77db103e21e98d01931436870432c73100346a3746c3a7e3a81ecab98f735f7ca898a64c1f495c0310ed7d07f559e642bd36fed84e4c5766

  • C:\Windows\SysWOW64\ikbkqtit.exe
    Filesize

    512KB

    MD5

    0eb2eaa874b1e482afd757de9c2e3809

    SHA1

    bb6e6cf789597851ddfe89d9372ce7d9586aab53

    SHA256

    ee242e71694a83cb5099ec868e115740d5d3a06219ab20458ecfca8f33a5ba50

    SHA512

    35d0211b2353b396c263b3f12d7c216b8a9c1f37c21aa7d34c1c226214587fffaf816901cb07ab2d9e1f2f3dc58ea50773daca9f851ab3e77deafdbdf27d2204

  • C:\Windows\SysWOW64\wzkjazeplfuzq.exe
    Filesize

    512KB

    MD5

    bb5eb07dd8353ff8ae3b7a0c358597cc

    SHA1

    518447c778ae2523b744cb90c3bffec98a7ea6b6

    SHA256

    d136428056f89f483253e6744e3a8ba87919d93e45601bd95f3cbe7b8b61ba41

    SHA512

    3e71d8e93d6378fd43492c42dd80d61ab30f290eb1f2253f69609dd24cb6bf6c913fdef7eedbb08777a3477d03aab1ae27281eca4b9580e3a99e76bc563812c2

  • C:\Windows\mydoc.rtf
    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
    Filesize

    512KB

    MD5

    4b8bcbb4073aabf84c2482a6696bc7b0

    SHA1

    dddc85fe8e825c1ea495fb465a82e3602fbfc213

    SHA256

    c80ed044b914d555dcd8db3de568a9435c6fec32f77c7de76c676e9760bc9dae

    SHA512

    a9a1563ec92cf351c5d4865ad8c5858bbead441c6e9369189cddac956f2df05ec96b17e48282a374cd4e652b04a88bb1dace67db9d8ba405c912e47f1e6c25a3

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
    Filesize

    512KB

    MD5

    b931a190e512f4bcd0ea9a3a35b44750

    SHA1

    b800be53036d0e52006ada84c2d2733382c9f5e2

    SHA256

    3ecfca58bfaf32b0dc7bf64294827cf936e949895ae50e459ac3275e2c130c68

    SHA512

    8c282f7c95bf1f2a10bcac710e33db9e8d923007838bc78b8156559982fe0664b2acb1153eb3bf7b3a6b6dc9538790d7fc3410e7f1e3a88196d8649bbbfaf8e4

  • memory/1576-36-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-41-0x00007FF9F2A40000-0x00007FF9F2A50000-memory.dmp
    Filesize

    64KB

  • memory/1576-39-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-38-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-35-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-37-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-40-0x00007FF9F2A40000-0x00007FF9F2A50000-memory.dmp
    Filesize

    64KB

  • memory/1576-121-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-120-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-123-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/1576-122-0x00007FF9F4F90000-0x00007FF9F4FA0000-memory.dmp
    Filesize

    64KB

  • memory/4832-0-0x0000000000400000-0x0000000000496000-memory.dmp
    Filesize

    600KB