Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 14:31

General

  • Target

    0c0b6efd87f15c9213fd4837482b3539_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    0c0b6efd87f15c9213fd4837482b3539

  • SHA1

    d61d47289c6f6d7bd5234151aa2d27d4faf9f06b

  • SHA256

    9b31df110e3d3978f09825461f9cdb1bbac78b3ddad83838e061903c49355434

  • SHA512

    b5878b634a41db13de4f5df4f4281c2df88345adef4fb1200f21acedef63191d2d9e0cb87f91c61163bcd9d54d0d1c1e9ad9b1ac74779a3fa9933bb70612d386

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6k:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c0b6efd87f15c9213fd4837482b3539_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c0b6efd87f15c9213fd4837482b3539_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\eojatojldy.exe
      eojatojldy.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\ybonxlht.exe
        C:\Windows\system32\ybonxlht.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2716
    • C:\Windows\SysWOW64\ugxfaxjdjuwchuy.exe
      ugxfaxjdjuwchuy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2768
    • C:\Windows\SysWOW64\ybonxlht.exe
      ybonxlht.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2728
    • C:\Windows\SysWOW64\rgurgiwnsmcxj.exe
      rgurgiwnsmcxj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2580
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      f1b8a3e5e45e1b3cd7b9cbd94b63fbeb

      SHA1

      9887b0f9f0ba047004fc4fd9b69b187fc0c2dee2

      SHA256

      07b1af08715668ac362077f5923022a63f8e41a3629cb89f990395b33cb1de0e

      SHA512

      c1780e22794a2afba2f01fe608d30f35c0a53c756204edb170e0672b34b19e92a461444c33638dac840da44e2d24d71233da14f7a19b07433a37837f80c534f0

    • C:\Windows\SysWOW64\ugxfaxjdjuwchuy.exe

      Filesize

      512KB

      MD5

      3a02725fedf9c853f5834ee09e185319

      SHA1

      40ff6675a63640555d951a40885f32e9186c8655

      SHA256

      ba3e298809e7c1162fe318a929456d0064cfcabf5cbabb54bfd828d03e55d1a7

      SHA512

      a12145782ccf49dbc87bba3c163c22ccdbe0c95d1020e54a57ab1ccd874b8a052c9f656ac6894607ab58cdfa2dff46ec22dcf8866a7171a15c8017295cd7b1f7

    • C:\Windows\SysWOW64\ybonxlht.exe

      Filesize

      512KB

      MD5

      0c6e6912654df10060c43cacc9e3e5d2

      SHA1

      b36331e60b5c07c1f0e57e287fa1095e637cf204

      SHA256

      4c4421a5ab258a3a98d2c288d615bf3e92de641f8f2c5c58762517c09515e947

      SHA512

      3d3e2ffdcb1c6ececdad33199b94a0f37131c78ce5fe0ab38f7b300ddab5516b5191dd2c286b97c1e882f8b84e7584f3a307a50b54d0e8c8b4d3936cf741a26c

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\eojatojldy.exe

      Filesize

      512KB

      MD5

      80dbda020aa2b286341af6f6d0f82590

      SHA1

      a2ade9c880407f48ab77da404485dbeec7f8f929

      SHA256

      2659d7aca3e5df37a6372502af0a90543ffab9f847033d96389fdff1829b83e9

      SHA512

      00adb07ba19e89a7ae46f210a06298bf50b79733a1149657984ea251270e833acc37f78051c92c8561160a5dba3557779da98be0e71c410449b800f16e41553f

    • \Windows\SysWOW64\rgurgiwnsmcxj.exe

      Filesize

      512KB

      MD5

      ec18dfc19510b96db9b1ed2ce57b82e4

      SHA1

      5b9bfd48767bc18dd19af52437813bf0099fd23a

      SHA256

      5405450fac6784202d7c71e2b71bfda1b4de3b17c626ae066938b408498a304b

      SHA512

      1fb13e074f9211d8e7c111319d846da633ac8d1bace5e633f3ad37d6206e9576eb4758d129fe01dd811747883b88d39866d02764dc02d166c2c15e1f374bb905

    • memory/2456-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2456-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3024-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB