Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 03:48

General

  • Target

    15d837f4b7d8bf1a58ddff1ff7a130f5_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    15d837f4b7d8bf1a58ddff1ff7a130f5

  • SHA1

    2ace67d4ab276d5317952e8017c653ba52dba8da

  • SHA256

    e22ec1bc29c50b22cad563e04de6c31b3e89e0db50b4226f90de5aee83e00041

  • SHA512

    88c63cec5be5171e7bf68919685adb61f9b1ba0ebede99307ce9d0fe0f6d549d1d99ed7a81c0d246e03b8809cc23d7d0d7d4cde076e96c683064b98055563188

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6+:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15d837f4b7d8bf1a58ddff1ff7a130f5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15d837f4b7d8bf1a58ddff1ff7a130f5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\SysWOW64\nwatittbow.exe
      nwatittbow.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Windows\SysWOW64\wmmoycoc.exe
        C:\Windows\system32\wmmoycoc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4892
    • C:\Windows\SysWOW64\bvhfwgihsueyvfj.exe
      bvhfwgihsueyvfj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2764
    • C:\Windows\SysWOW64\wmmoycoc.exe
      wmmoycoc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1856
    • C:\Windows\SysWOW64\yxblkstedfwek.exe
      yxblkstedfwek.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2980
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          8262bb3494bfff16db15bd2aa2f8fcb2

          SHA1

          110dda4a723b84b18049f9395723732c56b077d4

          SHA256

          213263c4ec4df20ea3d40daf5f59fa51e6d9b8da0292a10419f499b54f81cd8f

          SHA512

          cb027858dd037e9939c0553952ae0f116cfdba5d8b8f4ff2fd1301d2f62d9982936d523d5cf8a3e6f88b6a1c531d25e5b45aefb7ff6f7fa7cf5db9c1560f6d39

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          f1e4da1a7bd008d3d3379db58fcf0a84

          SHA1

          f4c308f4ef90d3d88a678d4a0ab8e3028380ac00

          SHA256

          0526887f126951018d202ed41801d63e24c0f4978498e6d73376c958c61da4c3

          SHA512

          404eca7bc6b86c132e6556e91d58b91fcffd95f0fde6b063c413ca8207aa76be0344f403167a962cc0d5dfa50050a841d03bbb785e21c4fdcf218b5b03efc769

        • C:\Users\Admin\AppData\Local\Temp\TCD7E3C.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          247B

          MD5

          3fb08aca75a205ed73b0408fd9667f93

          SHA1

          05aabb1ef7845de033f34ff1926339da10d769af

          SHA256

          7dfabc6abc218ee3130f94f6b26607d368bb3327c7d0f572667e8fb88501e37d

          SHA512

          5ded4edfe8f89b7bd2805a9dd498b743fcb9b3ec5fadb8f5c822128583c49c8a6701f7d2d6ecab3e8764d3542159fad7fd6242d106ae44c28dfd96f965822d51

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          d06894a9aaec73a731fd6e1077aae066

          SHA1

          3b90cd93871d4b9119b5768e50d2fa7d9642c572

          SHA256

          42911f1a569bd1f1291885b517e5fbb8cb1b09cb8b078253ed6c5e0658c9b453

          SHA512

          0390c9266b7f19983a96388f7a0becec14401d05e9b23447f16c05c62b8cf0678c9d65cf750a88e3ccec9d34ac98f9e6c4957f09b19a1fb5ae2b8fa1819b52c7

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          ea629e4f6b7e11950571adfe61631c1e

          SHA1

          fdd94c3be74fe23c27a08d70b4549563aae1e966

          SHA256

          15874d6ab0d145a06d56f1b088d80986701922a7fb174294d87fb89d3d8868ce

          SHA512

          0393aa3cd97d9dd4dd7445ebbbf2138af88689e12c46ed46566fd26371082f37c4f9a986e262949a5d41f5af9c411a16a24f1d3b2f56358c856dba27489fbbb3

        • C:\Users\Admin\Desktop\OptimizeDismount.doc.exe

          Filesize

          512KB

          MD5

          2ae0f71bc4a8b480856c514173b1a167

          SHA1

          13b35e319670bcfb3d3986a8ec541fadeaf2a202

          SHA256

          d3ae7e3f490531cda7eca6a4b8048932eb3d7b0f35c534ef0e8e37b5c0de4154

          SHA512

          cd950c6106df499657aa6e1ff1434eb72a6ddf41672bc739010667a5c8808e61f2bdf20ccdf87ee4b6037a6ff828ecd9415a69fe4f15e4b89002014b001ed5ec

        • C:\Windows\SysWOW64\bvhfwgihsueyvfj.exe

          Filesize

          512KB

          MD5

          e82d5cfadbd329206fdbfe2955ea663c

          SHA1

          4bfca30b0ff4d0e74a25e148640461aee238efc7

          SHA256

          c24a3da492b71505ddf5f50cbc44f3a3c625c6cc0d4026c8e9a409869301b8c8

          SHA512

          c69bf39f359899947b8ae913b9d63b91a98bf57dccc83c2dc5da93a6fa57fb251b6877427481615b50507f6413d32717459e952259780a82bc8e2a2116ee9688

        • C:\Windows\SysWOW64\nwatittbow.exe

          Filesize

          512KB

          MD5

          e619b3103dcffa02a79fc27a03cfe826

          SHA1

          1fd1cec81a3e682cafb02fbddb82c33380cca5e0

          SHA256

          56fa975fac86f6b656ceb79d240da29ec49133536c2a890d05e1f5081285dc02

          SHA512

          8b03e5101df176d698d799b7f4511128f57377551005ae43ee940acf67e922223b3bf1e50cb6023ec656fc5199307384e7620e36289ee3d38e8049deef8dfc7f

        • C:\Windows\SysWOW64\wmmoycoc.exe

          Filesize

          512KB

          MD5

          f295bb2319a86b3facca8bf9eb104b51

          SHA1

          76e474bfae497afd3050fda96c34c60c625010d5

          SHA256

          241533398aefde7f16e0c0f56a9f5877f51484f7e4aba3d12676fe671b81e797

          SHA512

          402e7eaa6dd2b18e1367232272d924b61bbe772d5d502b5cbe83e444b1f0591399a0322ce97725fef2a85376b361a52a4ce9c8facd3f53c637a7ed28ed406663

        • C:\Windows\SysWOW64\yxblkstedfwek.exe

          Filesize

          512KB

          MD5

          4fc22995f367bb491f48480d0463e10f

          SHA1

          aad0e3f665917b381296de22cc4ff705f0a85bb7

          SHA256

          90fc53847e6b8437b742e32a5081165a10763816f759cc4dfccbbffe668eb00e

          SHA512

          6d173243f3c7ba9320db3dd4e64a751e242c98019825b83aa40a925d74cc9901efba73c045d1e499f730d7cc10cda907aaff9e51c5393c48207517c7d7cfce28

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          abd6d2a325027cfeb93fd484e3f7e504

          SHA1

          9588d9688a34f01f923b253efaba622bed026ae2

          SHA256

          987ff824e0849285f0b21a19a53ac5424b5a3679a6a60884bd5323982bec42a7

          SHA512

          49698af0d6fd50a34dc183fd24d40155903c2414070ced0d1d3097132d5f96f69d7764ff90fdd88ad0110b1df1637a07aa77133801088e53b2cbeb7db126c568

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          d266e1b4383f89916c47e2e34ef0df55

          SHA1

          d20b6b1fd9af16b4513c7e739294c72d9fc4e180

          SHA256

          32f6710b426d3b78b6492d8984da40d663f198ede8008f7a4207beb37f627880

          SHA512

          28e61ab0ddc6efcddaa1263ab2f2954bf681cdcdcf60f1f2db3de72d0bb4ba14dd40a3802eca325d48f564923cb92daa5f179d56be05fffeaf1fee506f33043c

        • memory/436-37-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-41-0x00007FFFBFD80000-0x00007FFFBFD90000-memory.dmp

          Filesize

          64KB

        • memory/436-42-0x00007FF7C01B0000-0x00007FF7C01C0000-memory.dmp

          Filesize

          64KB

        • memory/436-40-0x00007FF7C01B0000-0x00007FF7C01C0000-memory.dmp

          Filesize

          64KB

        • memory/436-39-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-38-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-36-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-35-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-608-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-609-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-607-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/436-610-0x00007FF7C2530000-0x00007FF7C2540000-memory.dmp

          Filesize

          64KB

        • memory/5108-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB