Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 16:57

General

  • Target

    301d8b44a788ce1ea711e5a047a374bf_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    301d8b44a788ce1ea711e5a047a374bf

  • SHA1

    3783ab5ee1bd7f3cf5666459eb2e1f00443e883f

  • SHA256

    73f70fcdd3e13a86995dda6141a00194c72656c18606facdaa5591c52543f804

  • SHA512

    ee13045488953261836b90a3735fd61357140402b805c77952c8a46a34c3975726845350ec22fbfcf81ef2ed9227abd484f47c695fef39ee47da1ce0a92efdba

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301d8b44a788ce1ea711e5a047a374bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\301d8b44a788ce1ea711e5a047a374bf_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\fmcmhxgaoy.exe
      fmcmhxgaoy.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\oiriknft.exe
        C:\Windows\system32\oiriknft.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2124
    • C:\Windows\SysWOW64\sycbzesfphacdul.exe
      sycbzesfphacdul.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1712
    • C:\Windows\SysWOW64\oiriknft.exe
      oiriknft.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2788
    • C:\Windows\SysWOW64\vzixoqbtknter.exe
      vzixoqbtknter.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2644
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1896

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

            Filesize

            512KB

            MD5

            d72fb0c1de53ae6f5d91f69eb0130fcf

            SHA1

            65770be24bd72205f9f6ed1c19a8b415f996e1e8

            SHA256

            709ebec25bec135f0a72710713226abc632be2035d741b71c9ee806bf801123c

            SHA512

            ee1c4bfa88828274aefc30735c0bf5d146a0373b91c9ca3cd9cb154e411c76ede6d8519cc6e9c96df1210a677348f3253d97c986a7286e592f9d7a3c7bd8348c

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            8fa20cbdc28237e1d6e5c2d2692ab143

            SHA1

            8c71b18c4c24e8f92a2c77a97c13785c4ffc71fa

            SHA256

            a11e31fa65ab1347fc42cc5133495752e7878d2ed362412111cd9f1dfafcaa6d

            SHA512

            84900dc7983f112a88f5bd07149cbed387432d34ea60ca061f9bf6685210605cf96b0b1b4cdf0d40cf3223db54d0e86d8f56cadbde54fce3b1cc41b9f630ddfc

          • C:\Windows\SysWOW64\oiriknft.exe

            Filesize

            512KB

            MD5

            babee032217444908e14068d32586986

            SHA1

            7cf5ef00162d1c4c11a1461e24909bfae8c6338e

            SHA256

            132d5d0305b55e80940b246ecbfbe3026611d68aae3c25b4840724bfe3b0b6e9

            SHA512

            57b0c01c843a27ea4282dd64886a424d37007d1095a46a70cc95738180cca6463f187b48a1e9b105a39b2359225ee081b839c87e1fbbb3713899a91d8cad43eb

          • C:\Windows\SysWOW64\sycbzesfphacdul.exe

            Filesize

            512KB

            MD5

            06c2fb0781ceae1ff8d02e3fd09015de

            SHA1

            225907740ff60d705c40e3283f3260b73c45c757

            SHA256

            e654a30e043aca21b2706775446c64c597a4dc94c96dfc1925f13a84953b0960

            SHA512

            928177f548c7263a6a6bf7a7bfdc25f6d6206b934a7cbb354309f8c2d64ffa041a06caf7c6e4c0af8bf2702ab999ad86088faf15ad430c5268c9b6046ce47a29

          • C:\Windows\SysWOW64\vzixoqbtknter.exe

            Filesize

            512KB

            MD5

            ca99ea198e49cbc7f53f230af005a775

            SHA1

            49873bf347d70dac8262ad49bf29377e1a515cf9

            SHA256

            782b9c3a4719cf7be213358da204710721dc3145e667868e79d2392850c66769

            SHA512

            193d6154fa02dfb68d1045b0d6d709fbccf0b68ff4e0f667fba656ea64498acaeec4d32057974678e8db07a871edc07e666dd87b497a91d2dc0498750506fc30

          • C:\Windows\mydoc.rtf

            Filesize

            223B

            MD5

            06604e5941c126e2e7be02c5cd9f62ec

            SHA1

            4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

            SHA256

            85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

            SHA512

            803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

          • \Windows\SysWOW64\fmcmhxgaoy.exe

            Filesize

            512KB

            MD5

            6b5014f6b31447cf73a84d2cecce37dc

            SHA1

            49d1456784adb6bec8e1877b42b9f63bb9db49ff

            SHA256

            bff45274c0b318f89f46878ad968c511dbd21542a46fb97977b49700b81174d3

            SHA512

            de89b27c5d72e9b8adcbba89f30ad649d94a3ca77d4d784b240e0aef2cd265e7fd3146f9170254f89562378463d531850f16e55b735b9aaaf173f8253870c24d

          • memory/2372-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/2792-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2792-98-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB