Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 23:04

General

  • Target

    2c252045d6782f42939dd27ef98d5a9e_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    2c252045d6782f42939dd27ef98d5a9e

  • SHA1

    92d701a2a69e1bb954c33a44c0ee2260fd19552b

  • SHA256

    559eda8f1d3e9a742aeeda5cd024da9e6531656a00881cd4df5f28d3fdcd8809

  • SHA512

    12e7d20cec0c4023ce2942a322ad3ab503aad2cd0c016983a4c9b185a422dd34e446c1ea940779877a594325a5187fe674a9fc87bb8e89078bca9eaf8229f1bd

  • SSDEEP

    12288:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5ms:1gDhdkMRWfLTUO2Zu1um5ms

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c252045d6782f42939dd27ef98d5a9e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c252045d6782f42939dd27ef98d5a9e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\uldqkrywkz.exe
      uldqkrywkz.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Windows\SysWOW64\rasgkqex.exe
        C:\Windows\system32\rasgkqex.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3616
    • C:\Windows\SysWOW64\fumvlpluxxcfbkd.exe
      fumvlpluxxcfbkd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1964
    • C:\Windows\SysWOW64\rasgkqex.exe
      rasgkqex.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2068
    • C:\Windows\SysWOW64\qixfjbbydhzws.exe
      qixfjbbydhzws.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3388
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    8b767e906b1a33a054c5f451d6ec78b8

    SHA1

    74d101d5d2ada710c692bd025374d645893ee50f

    SHA256

    1a1a4faf232a2c890bce176d094f0cd5fc9377af8ff7ee675ab091ac024e40d5

    SHA512

    aa3fb2af7585040cbe5c737cdc7b2c9d1a95f6d7f0f2df4d704604812aaa24413312c3ec37e9597516f3a742c7bbe0f45cc319f387d1c824c06cb55d61818d33

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    1e0bba2a09396b9301b54e4bfe3a65bb

    SHA1

    d572fe923468cda812063357dd03d23b334b2517

    SHA256

    4ea7d16d846def190ba1feefcb43aff5ca900b300f31714a2a594ec976ecea6d

    SHA512

    a8b8162202eabe299473cb5f9150c77f9bb1d3e43a3f750a38ace9a01132ceaf8cc8e12ad3daecdb335ed4a8bacbcca9b2798a3be0fbb96af87f35f97f4cdf31

  • C:\Program Files\MountUnpublish.doc.exe

    Filesize

    512KB

    MD5

    b52273394a632393d4c77247c1b4d228

    SHA1

    705bcab1fd729fe986f617ebdb574b7890d31b82

    SHA256

    7c948caf981f10f00a057ecce94410a5ac1bd068486565998f10187d932ddcbd

    SHA512

    3e17cf2ae6a0db6bfd5afd8a2d43d6fb2ef3d96cb5a06300d09ebadca86d1c103f14cdc0df9a2fdcc31fa55e78962eb8c1776ba8a4b4cb10f984bd1363711b89

  • C:\Program Files\TestDebug.doc.exe

    Filesize

    512KB

    MD5

    7902f304183a0f2e8c980419bc95aa12

    SHA1

    c414887daee93376af9baa7e0ca1f0e68416b3de

    SHA256

    190e08de8157f4e3eef03aeed3909633102c8a77517a31e0ca2fe8baa98cd09f

    SHA512

    59e82b1f8df58dd4f4d82600b3478211a05beafc5ede2cfade961a911e2a4e638749e01a9ab4f04f0cbaa685de8cf513bbb0e0ebd9b2c328f668ba11b029d8ee

  • C:\Users\Admin\AppData\Local\Temp\TCD8B4F.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    f1a65da78b1e3f1b98f255b37bcd1be6

    SHA1

    e21b9cebafc8cdab5b3bfa419f064d894340e74b

    SHA256

    ff0e89b5bd40523f17aad52c3b7c4e31fa76d8c34ef8b444ee87ad015eb06a5b

    SHA512

    0bd863152ca3320ea7a854b2d9130574f355fefdfbb0f8b6430d1e0a484f9c8b715bea018dc6d08a5aa85f3f63c9506be33adf5ce929425b2baa518dca023fd4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4369117d71e0421916b524ee3a5a3ae9

    SHA1

    53c23da5c862930bbb08310d6aaf12607030a489

    SHA256

    5edd4c3ade3e3b971f7c18a62b124b0be0c7b9b409e95b0c2116a2f70c496bd9

    SHA512

    f6dff9ebbfda3c86e2822a58a39da4c7c69a6e258e99c7dca23d0fdcd5ae1f0f9b5ebbbe1df910041040b8d177bbd8d2465219d6ae950e59598705c66e353c11

  • C:\Windows\SysWOW64\fumvlpluxxcfbkd.exe

    Filesize

    512KB

    MD5

    dd049847fe78e3b8fc574dd1d74a3ea0

    SHA1

    f30cf31b57020f8a4b81c01cfd368fbe4bac91ed

    SHA256

    2b9e371f275dc32390328a7646ada5eb222f706523c2863c36087fe548bcf899

    SHA512

    3f065edf11349bb025e34b9bd30b2cdcac501711d6fdbe38c2a8359b3da5b7c22797f0b56e4a7d893b6e58b4a66e1222be9ab851246fbbc2c66663f41adafe0b

  • C:\Windows\SysWOW64\qixfjbbydhzws.exe

    Filesize

    512KB

    MD5

    3b8761c087c6612f9bf93e9e44cafcb1

    SHA1

    73820bd6ac0a2cea61c0c0a77a5e44048a0d5d5c

    SHA256

    15718702d5272561bf1fa9ac1bb23153e2824fac84bbc46862aff693ccd764d0

    SHA512

    85a296447c203467a07cf35a7abcec6c454b7d0e67c9366b3e0d62424f60034220eaa052e776063cc4748dadedc9d06ddafcd4064f0294fe037c1bf5e1826788

  • C:\Windows\SysWOW64\rasgkqex.exe

    Filesize

    512KB

    MD5

    d3b1585b7202c1198c00cd2eb9d817bf

    SHA1

    8ae0bd48a64e79b679a3dbc7f751d82a07c7c1a3

    SHA256

    69e80b03d6cc3dbaf4cb88cbcc6b40bc4752c69058d867c5c746e43a456696d9

    SHA512

    91eb4666780c0527dd04edfbd16f42f456085908c93f7a2bbe375b2bb3f6322e37a992f54ff349e250af7272dcb455c157365f5907d3ff4a3007161beedd537e

  • C:\Windows\SysWOW64\uldqkrywkz.exe

    Filesize

    512KB

    MD5

    b6acb6c77d3c7ba07245fb6f90f205da

    SHA1

    fd9a064817b4bc4fa1d1b323bb53e304b61847d5

    SHA256

    0a8593d17ff805ea844abef2eb8fe4f579c668ca5c0fcf5f59182f0d83172834

    SHA512

    3feb67355e9b7eab5d67582867376f7b59fbded0a376fcfc62c5e207e0ca38b36a388812d86b399cd7ab07999f1ddf137cc9621f8f24c123e6a2f14e148309d1

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    699215605b6b96c57d988ec2a9749e3f

    SHA1

    a147601e0fe1988c1e75a47cc8103d270008b5a2

    SHA256

    12a9ad13e2a9eff1fee890864ed56c49249e2dac3320a2cf977bf1f8c930adc3

    SHA512

    7c7018d0bb72b4d489ad3e25f9862672ff2af3c7bb25662f9260f02561080ed656ba428f9d872bc2675cb454147b0304fa04935a7aeb5d8809c2c8cfc65ed360

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    cab98ccfc8f4c5ab9d9ea8c10f9bc7d9

    SHA1

    38a43328aeb04bf0631259ee223180eb2d0602c5

    SHA256

    e951e61fe12953ae78c2b71e23a2a04c3bc9001beb40793f1217c6d0dfcc5fdd

    SHA512

    f91528edf84c5016d636462fc1dc4aa03cff6adce43896bf07fcbd769499456e1536597249f88b64a9454029b8fab947488435ee4dfcdd0d6fc89b21d7fef687

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6e13786aba15e34d114aa41a1128632b

    SHA1

    b8be58de34e209562820b7c7a1166f5c2bc03301

    SHA256

    7f918bfc4863ab1b77ce86145aec6b7028441f88668e0e22404ce2c366d5c612

    SHA512

    82b1d2d1d551d99fe8598d2e502f1a7e5f780585b0507a27404ec9125a0c7aee8fdd5e60ac7c0b2c5df13cc2b0da617c73ba083c58466e9cfb24780251d4f406

  • memory/3432-41-0x00007FF95C9A0000-0x00007FF95C9B0000-memory.dmp

    Filesize

    64KB

  • memory/3432-40-0x00007FF95C9A0000-0x00007FF95C9B0000-memory.dmp

    Filesize

    64KB

  • memory/3432-39-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-38-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-35-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-36-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-37-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-595-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-596-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-598-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/3432-597-0x00007FF95EF90000-0x00007FF95EFA0000-memory.dmp

    Filesize

    64KB

  • memory/4880-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB