Analysis

  • max time kernel
    149s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2024 15:33

General

  • Target

    0c2ad584d31fe206c899182dda81e46c_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    0c2ad584d31fe206c899182dda81e46c

  • SHA1

    af69f9ca058a751f340f1927c7fe3095bfc90363

  • SHA256

    33a0bb3fa801f4c63f4c4cc849e2efd6561518dfcc50ee5feaa8cd3ef3418a8e

  • SHA512

    005735b3cd1861c0c773f7c13c222e2b4f86fd81b3cafd20530bbf0075a4b80646ced3edc4cd0220f4cf66d2cc7e88df458d974655abd688f26f5a55d7dba299

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm58

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c2ad584d31fe206c899182dda81e46c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c2ad584d31fe206c899182dda81e46c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\dnjpeyojmm.exe
      dnjpeyojmm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\SysWOW64\wdameyzz.exe
        C:\Windows\system32\wdameyzz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2044
    • C:\Windows\SysWOW64\ldtoydbkjjfhjwh.exe
      ldtoydbkjjfhjwh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4440
    • C:\Windows\SysWOW64\wdameyzz.exe
      wdameyzz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2904
    • C:\Windows\SysWOW64\ulcyhchapatsp.exe
      ulcyhchapatsp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3256
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    2d91cfe64c21a52f96c70b84bc1c03c9

    SHA1

    a101c3b0b01995410534b16e44de598a8ba71626

    SHA256

    134196711a1d91b243411d50fb39a73d15030a2ff3cd1725068ed794452346a6

    SHA512

    4aad86ec6c11b8665ba171cc723ba3043fb0fe9a3c7fcbc3410ce2d848c1743fcd5a355cd42a55f8562a1e3febba90cc8ccacee3a3b7d61089acd7ac760cc300

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ef3484d293ca109c2a9b892a3107417a

    SHA1

    36366ae44ab71141beb04bb39ca45cd1feff4fb4

    SHA256

    75ab5e277c051878320856d03c1867d213e2464dd12b5b273c26dc513b783261

    SHA512

    910e391410b0e287c30bfd1fab5533dd4d3267c7b5ae326431d2b6e967a884cbc3cf6963fca41abb495b36449076b92bcbe92c21365802b907fe36017ded0c7c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    5bf9b28420faa9f04c1522f337eab1bf

    SHA1

    000f1c15e1cc88c8a32a7928611e7a9a45f4353e

    SHA256

    c7608c8bd1d3a09862820e3e2bdb3f6284940e88bfc66e8653614343f41c5218

    SHA512

    440f749a037942220754074fb9566aacd407526191029418a92a762e1ce6906ce7a11bccaea3f9f0feb00fe1466eca673f62ff645745be17961d5acc00f48ffc

  • C:\Users\Admin\Desktop\InvokeRegister.doc.exe

    Filesize

    512KB

    MD5

    1f7c5d7d8fd2de044d5a62f403abf0bc

    SHA1

    608e0cf1b61e9a72faf02ea0050401247e39bc5d

    SHA256

    68c89877a0ed4e357a39448f2fe1a5b82215eb26c6ec991097f640ce9fe22dcb

    SHA512

    440e9c963f6cad21299374076c701179167d1e9f5a1a81bad92dd2b1ba0b2a111e168157ff7cfd2682a268d0cb5c2d017ea0f9142989c2f356690c212f1a003b

  • C:\Windows\SysWOW64\dnjpeyojmm.exe

    Filesize

    512KB

    MD5

    fc5a684619e40203ece4337d5c4d7115

    SHA1

    3620fc1dbf1b74bacc3a21a1875d8d57a8630a6c

    SHA256

    3c67f007098b0ca63849859f118d479cd09bdf101bed3eae418431e7c4b244c0

    SHA512

    d247a4c5cec0dc75a6fc0b9f06e4cccbda2c1805deb8058ff75d595755cf6a2ddb65ffb5c6ca4c2a1dba08e97ab857cb3cf17736bc59226eda37fcac333c82ea

  • C:\Windows\SysWOW64\ldtoydbkjjfhjwh.exe

    Filesize

    512KB

    MD5

    b89212412a19f468c0f73a3763de37a5

    SHA1

    e3b326027c28fcc4d2514562af2d2e915159c469

    SHA256

    dabb3a6d0d8ec6036eb86415ce34838f8924589fd1e57232d8083e95d19d8f1c

    SHA512

    5e33a8525c3cf63dcf9e82a2e75af23c7b7ea49366f9d9151e0321ec9ac61b1b0c673c4770b9dbf162a05d5034ea2ea654e48e22ee3a03724839c3d0795dbd55

  • C:\Windows\SysWOW64\ulcyhchapatsp.exe

    Filesize

    512KB

    MD5

    c9125fe85443e2552a22156611be3027

    SHA1

    7b4c2649342ed01b3a48cdc4470e80af0c12f6cf

    SHA256

    bc815843e90d92fb73f587bf6745570d0cba87b7230318f95965c008926f8238

    SHA512

    5f942f1bbe144d5f8113d5eb8e2a252369e0a6f525cb4f51acab289dc5d306525563e2c0c03c231cdf7dce9224b46bd2d18009004af08751471b7a92a948ff5d

  • C:\Windows\SysWOW64\wdameyzz.exe

    Filesize

    512KB

    MD5

    f95eb0ad10c4a675b3fc45bb1ba584ea

    SHA1

    129a313e6eb8bc4fe9c7e27aa184f6aa2e521341

    SHA256

    03abcadbaddf86acba6c6e0351536841833f0b50774394716ba8621dc5686e5f

    SHA512

    94ba906d45fa54b351a5dcb5918bffa24f43778110597f45c16b820bdb1d459e406f0e6f6ba3d58e46b0c8ece93131a253d47cf95d42da1c11339fbfb8641914

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    af4708ef799debd0e11d0b04df928b78

    SHA1

    1cb0de364a8cf98c01e1da2fdabc0b95ed7e5aa5

    SHA256

    39fcb6398fdcd5aca428b997261f634b6dbdcef713cb702b6131b78083a3b5ad

    SHA512

    da4afd5e3b86c108d7b815c82302c1766789dee862b01e403b8a06ee685f2131c11bf1dda69357ddcd022a17a4eb6d77e98d8800f7610f38971bcd10e5d77e9d

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    1218170addf203aa0ed1799332ca5ed6

    SHA1

    01174d31919734c2074176be6e47b5240e902ee6

    SHA256

    8074ecfd2358fbeaf8616500525c62afbd0dd78d97feb6efc642866b60f36723

    SHA512

    dfafa4f68a1a67d536e61986d32b3c20e0c2bdaf753c5a6f6e2e823442c4de60d31e3320bd94176377c2b2335f0b7b317b1cdf8ea0b703cd36f303f04a6cfb03

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    35d79c451b194072333bb142d0e23905

    SHA1

    d5672dec2baa1d5166a5e76b29e68e2f6505fbd7

    SHA256

    b641ce814e3789e5f0d2173c59b91b2bfa6eee856d94f6efc2054f5d0e841dd6

    SHA512

    823f573ea39bc80c6bce219f87c534c7fefdfc72abc391377fc91cf3acd54af82c2f7b6a7e8642ae50fd277f3aadd259dafebabf0862cd0da26d615e0606686e

  • memory/1388-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2684-39-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-36-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-38-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-35-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-41-0x00007FFDB7AB0000-0x00007FFDB7AC0000-memory.dmp

    Filesize

    64KB

  • memory/2684-37-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-40-0x00007FFDB7AB0000-0x00007FFDB7AC0000-memory.dmp

    Filesize

    64KB

  • memory/2684-116-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-117-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-119-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB

  • memory/2684-118-0x00007FFDBA1D0000-0x00007FFDBA1E0000-memory.dmp

    Filesize

    64KB