Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 06:30

General

  • Target

    28b84dca448ab58fa3a35940a125f7d4_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    28b84dca448ab58fa3a35940a125f7d4

  • SHA1

    9ce6b74321a985ee2ca0888147eab15796a6c013

  • SHA256

    6e8742ca1f6c692bfa9933281637d47aaf08b77909a51629fcfa60d87a1b4e1b

  • SHA512

    d019b108fab6c3b87a8cfae2f78e29288a14f0842686ec0bc4388109d8cafc0444c5763858c72208848846e5338e5780f0254160793b10245df4066922dadeda

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5g

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\28b84dca448ab58fa3a35940a125f7d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28b84dca448ab58fa3a35940a125f7d4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Windows\SysWOW64\mfbwnbpzps.exe
      mfbwnbpzps.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\gjzorbzh.exe
        C:\Windows\system32\gjzorbzh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2488
    • C:\Windows\SysWOW64\knbsngcsczhitfa.exe
      knbsngcsczhitfa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c rlguguuzhlhhu.exe
        3⤵
          PID:2580
      • C:\Windows\SysWOW64\gjzorbzh.exe
        gjzorbzh.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2648
      • C:\Windows\SysWOW64\rlguguuzhlhhu.exe
        rlguguuzhlhhu.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2820
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:320
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2028

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

              Filesize

              512KB

              MD5

              5a1397001ada03f8c01614df2f6145bc

              SHA1

              fdff0a8d96d8f173a43edba8b093873faa134969

              SHA256

              dbeeb297e996736aea9007b7e21c5796c35c4e5d9f1066d7298538e9e2bb719f

              SHA512

              966407edcc70186b861ce9c9db371581eb6ca0f01806c107cd5bd9311b2125d7b4457c878ea4433c01ff8b7a2e38cf3baf57955197bd08eeb18a579ba8d19593

            • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

              Filesize

              512KB

              MD5

              bef66447e038cc17733d5676b8cad989

              SHA1

              aa86f1df6263f9571c66b398e64876b22294bb40

              SHA256

              511ac81010cb8c3ae87073ef2806c252a6b16bc63d98d78b9595caf2460c32a9

              SHA512

              50dbf920130ff6394e3648b69d92a7f148c2a25eabc557d990ee29f710e44dfb903ecf4046d9eb61099f2663437f89d397583e4d3a54437d6e76ce6400c0c818

            • C:\Users\Admin\AppData\Roaming\ResolveUnregister.doc.exe

              Filesize

              512KB

              MD5

              df64391866739e02a8fccf3956497a90

              SHA1

              2936e5416eb288b373257c29058e1c11ddbf2869

              SHA256

              f941872ab797c26d9f2d52a1aab30158bdc36cf4611bfb24189aad7e8aaa5d78

              SHA512

              fa748be8b23de0d01489b495cfd7e700959e51757fbefb7aa9a957294e1f0f56892128e3c349cf5ddcad6dd2bf19a91b3df977de10b0f5646b60ff829ac83b67

            • C:\Windows\SysWOW64\gjzorbzh.exe

              Filesize

              512KB

              MD5

              2ed075b94dbedb00acc1f984cc57f343

              SHA1

              30480c4978dcb5ab0e872412783dc7e860c51027

              SHA256

              db0f4fc0255de3cbda6dca2e80380b501329959c60f012abec4b3c8a36f8dbe5

              SHA512

              573845eb97b39fb6ffc455eb76224bbb33ca5baec21283dce7434974f019eb5db0f41fc686d168b9b6381b7b5bd7d688741e869f7728d35897d58675f6c408c0

            • C:\Windows\SysWOW64\knbsngcsczhitfa.exe

              Filesize

              512KB

              MD5

              68e94326c65ee6dfc9256467301f7a9a

              SHA1

              84faee2ebc9d6c928aa017c0f879f1a1554caa60

              SHA256

              c633fa8216c810ffec67812e867de9d2442845ecb231d2205e41e259f8c336d9

              SHA512

              f456cfe599bf7c232e554f717ee506a0cb1b9969dc1b6c3022197ffbb8710b0e509611bdaef4c19d45da01d01c3e78ece7a8bfc2761779cfc837beb5666d0f22

            • C:\Windows\mydoc.rtf

              Filesize

              223B

              MD5

              06604e5941c126e2e7be02c5cd9f62ec

              SHA1

              4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

              SHA256

              85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

              SHA512

              803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

            • \Windows\SysWOW64\mfbwnbpzps.exe

              Filesize

              512KB

              MD5

              7bae9a4a6053c0ea4211e260acf42d11

              SHA1

              3b1ea907489f45ec3851a8820c18e6f1306109e9

              SHA256

              eb7a08920ca8cf2c024754c335d1b84914b13d344a026bc648b3da1222702c36

              SHA512

              208bcbecd7eabb7c1634c3d7d72372486fa76ad0e691faca5c4351813557e5d18a39a00bb31cdb68991397badc423b767fcd30b6792e5552182cd669e389142a

            • \Windows\SysWOW64\rlguguuzhlhhu.exe

              Filesize

              512KB

              MD5

              dbe88598a45ba9bda798ee0a75379c14

              SHA1

              3e8852c53237b3b442dcf585254984da87a953f5

              SHA256

              302fe1e841f9a024d52ba91fcfcbbdfb14624b6ddee4285aa6131fbe81e2793c

              SHA512

              edba849568b96308682347476c7fb721ccd8660b2ec8d8af41e0d89545c47d6660d0b257ad046274152dc9fde36b282b19b64d4a80eac0d45bbc6d5bce72c1b8

            • memory/236-0-0x0000000000400000-0x0000000000496000-memory.dmp

              Filesize

              600KB

            • memory/2028-92-0x00000000029E0000-0x00000000029F0000-memory.dmp

              Filesize

              64KB

            • memory/2452-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB