Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 05:17

General

  • Target

    1624dc9535d5a83f542323e1d0a34e3a_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    1624dc9535d5a83f542323e1d0a34e3a

  • SHA1

    08426e094d6c34ad38d9fd39d83b02e23b6c53c1

  • SHA256

    a025cb33d356a0395c4e098f8f66800ac4bb02eddbd049a26c8957b5bd6a4705

  • SHA512

    9ce3c6f26cedcc4c51aabf7315d734374eb5928349927652389aa836510141a70c6b71461b19fd57d5840c63bbaf37200d57d91b97c2e61666829a4b823d4167

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj60:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5d

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1624dc9535d5a83f542323e1d0a34e3a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1624dc9535d5a83f542323e1d0a34e3a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\mtzeurdnlq.exe
      mtzeurdnlq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\bpoivyok.exe
        C:\Windows\system32\bpoivyok.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3696
    • C:\Windows\SysWOW64\stjbhjdzchvpygn.exe
      stjbhjdzchvpygn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2276
    • C:\Windows\SysWOW64\bpoivyok.exe
      bpoivyok.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4256
    • C:\Windows\SysWOW64\vkxkowgehmtjq.exe
      vkxkowgehmtjq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2156
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    c67e5f3ccfc5b8e6412ce0e22fcd2ec4

    SHA1

    239a1b7a0126c3278eb333fbb87391082239efef

    SHA256

    554fa8b4e21cde94d8d861f67e4f73c073a11b5f30adf90b96c26ef9a6a4a715

    SHA512

    e40199648a217577f1c6fb61d6fd1607c24179b4c3205ffffce347b2e38717cdeb2b51a9de55861f885fc0759d6a834b102d1d175a4d1529e5fb4ab4180b7a4b

  • C:\Users\Admin\AppData\Local\Temp\TCD7747.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    237B

    MD5

    649bc605ae9708b085f88482b636a352

    SHA1

    085761071b21290e8f8458f8ae88f60d78addeec

    SHA256

    81e2206047094c149eeaabe9815da4a2fdbaeb5bc8bc53692190fa7e8fdcc55b

    SHA512

    74bfc4b137266b314a40d36f72a39fed9f1659558eb8695cbd0543b6dbf9146b0523bf8f49c03b3bb8bff614e3c02b159187f1b55093caaff9b1ce3b366f44c7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    00dc1514989583bb7235e98681e1aa1c

    SHA1

    a450d7d214693d76cd95c9449f536c8d060fd1d5

    SHA256

    0274b24dd07e3629de6606a52ffc731aa2ddbb076e5c544f94dddd30a2a284fa

    SHA512

    8f80a633811c6dffeff208e535c984fd5135f3464bf0b75d7a2475afa8afd993172a6f9450b5ae0134d61b96492f31ff46f3105f417e49c64b4622a70843021a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4c59b44c86a13d1b9e43680d8fad46ec

    SHA1

    ba7eb6afcd82006941ef3512e03d1a6e71a6546f

    SHA256

    9e638d036a4870614bc4470fcfdc6dff4feddc5c41f301b144089ac8652c075c

    SHA512

    dfe427fe411e9cb78e47242360a6182838f52e40fa247a3df7ca9e57e763e26072c9ebd1836cf0358aa2cb8cbabcd9d09de0394cb73103be0920891d0567a16c

  • C:\Windows\SysWOW64\bpoivyok.exe

    Filesize

    512KB

    MD5

    b120904b16b92e0e64f5ba8ea344aada

    SHA1

    0c31d9aa1856290029aeb45586bdb5607cfdc020

    SHA256

    03e14177735fc0bd9331d8de47e0acd85853bf760c2c1135c6246668a224c942

    SHA512

    5365536c3aa8ee64b5689486a7a06265f9d0ca8cf09b6c6286996b98ec37855bfef303b808932c8858c5585ad7d3093e32ed94d9fecd23934224f33158440248

  • C:\Windows\SysWOW64\mtzeurdnlq.exe

    Filesize

    512KB

    MD5

    44a4f8f19d64c251be57d8350a29fcf2

    SHA1

    bebb5e43494577cb15429bb00449247c7021cc62

    SHA256

    e30d8ab3944db46e984ed7012f0481e14d2e128a506a90b8bc0175babc6fde99

    SHA512

    283aee3c5b995e70eeb28ea6c524b61af60110811b7e2c6be6a97c6bc8807205525ae62d9909a3db209153847c571a44d331a54ec6558e6be5f34740d1a22963

  • C:\Windows\SysWOW64\stjbhjdzchvpygn.exe

    Filesize

    512KB

    MD5

    232d51d7ec12caca8c6e2c0db835cad9

    SHA1

    8a6a19a0205f7d5f97abd8f2b2b5b9a4a5a8606e

    SHA256

    9799a4abfaeb34656849284e024f96f78aed9a5fcd25f2c9a72403234043a1f6

    SHA512

    cd37f5687f71113ec9002d59518507bce85543c392f403b1f1ebf8d52fb53ef9991108e8f6dbda563910a5be1d32a7424ffd1805fd24688af2e91857d6576e90

  • C:\Windows\SysWOW64\vkxkowgehmtjq.exe

    Filesize

    512KB

    MD5

    1115d0a96264e01bf6eb8466e6244ec7

    SHA1

    77b3033db7f3f204d93f5dab5d9930ea88d56eae

    SHA256

    f922a2702dfc8ecefa23c8b9db972a31d808701b648bedc402fc43fdc40803c1

    SHA512

    553c44514baf2d40578e118411831178802de23163e6fb1c4e9174e34208d477c918dea34bc9de71c91764b45991b620843a75f064e49567a1b382beb351a44c

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    6414465dad18a85a3c7f97a19c9a35e4

    SHA1

    1b8309ee65c9c153465694805613d7c9640ceec9

    SHA256

    98b60ec968516f06e98e7dc7c32eb53bb4ac814250286381ce90d66ca0b8731b

    SHA512

    7ab3b99ae9f90fcf544e780429e8d0f6ae938806d65423f2df9884051f8caa84631162ec8b70fe8247b54b8a08e253b86fd5fa532c665ab8bdadd03a0080a741

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    37098889f2c3d62b0e178962e6b408da

    SHA1

    cacb8f5ca891a3bd08421ff84f36c4a94a1855d5

    SHA256

    d32a43b6496c43ddd268eb25ea2f2458db0073320bb6bbf99032d9c3d4b19e72

    SHA512

    2173cefab2bed26a82fa69d9e4513438a776cf75db5ae9ee9d7674b2a7d80f3e3d5956fc9129489c21b8026506af2a11a706ee42fa7ce263bfe36dc263b62ef2

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    4481141fc1c74f4a11e3a9ec6e5d8524

    SHA1

    be860f04765a784ea4d5a5c94f7894c11ccf9d86

    SHA256

    7e6f4b0943a1c1b00178ba2f0c44f4ba3f4411a4ae7f647f7726db80047feaeb

    SHA512

    f921ef8109970814338481775652fd2b18e8e13b0274ae3b1dead56278f46e9f736ea423117673e489c55168b2386033654075e9d0b2a1db9a84c3f7c1d18bcd

  • memory/1776-39-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-40-0x00007FFD8AA40000-0x00007FFD8AA50000-memory.dmp

    Filesize

    64KB

  • memory/1776-38-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-37-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-36-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-35-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-41-0x00007FFD8AA40000-0x00007FFD8AA50000-memory.dmp

    Filesize

    64KB

  • memory/1776-602-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-605-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-604-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1776-603-0x00007FFD8CD10000-0x00007FFD8CD20000-memory.dmp

    Filesize

    64KB

  • memory/1840-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB