Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 02:31

General

  • Target

    37c9021b5c604c13ddcb215e45522baf_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    37c9021b5c604c13ddcb215e45522baf

  • SHA1

    2a3b8dd39e99d64af92f43627b988194eea5181e

  • SHA256

    6336e604f1684cf483355dae37979b9ae66f039c0caaf616f64c4df715b8d12f

  • SHA512

    59fe6b199a15ac0013aac62f6698e584d3b0bc7107e38571bf34e2b4bd6bc5a221a6afcf3fb59912f37fb9530037ce7afeb4e420dd9f9ebb247264bd513c5811

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6j:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5O

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37c9021b5c604c13ddcb215e45522baf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\37c9021b5c604c13ddcb215e45522baf_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\SysWOW64\wrcetegoyo.exe
      wrcetegoyo.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\SysWOW64\aljzzmrt.exe
        C:\Windows\system32\aljzzmrt.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3104
    • C:\Windows\SysWOW64\llenkqobymangxt.exe
      llenkqobymangxt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4284
    • C:\Windows\SysWOW64\aljzzmrt.exe
      aljzzmrt.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2216
    • C:\Windows\SysWOW64\vbgfxaovnozgb.exe
      vbgfxaovnozgb.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2872
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3668

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          91b7fb6cd0da31e0a3b87e0f902e6c12

          SHA1

          3d2d4ceed0908dca7716eec3a167be56abb8578c

          SHA256

          664be05144d739d44ef1820de095c718157333543a3efdbc00cdf7d44773c9fb

          SHA512

          5d3173ec50cff083a22bcd2e5e87bf3e0ec8801b34f8005a7d471be8829c153f6f2a7b261f2478058534df4118b09486746ddcb4bdd2e44582272d7d028f4a1f

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          71c0d5ae5614898764a89df8ca2868b8

          SHA1

          cf78377c3e4c193d71edf10762cbb8fd6102ebbf

          SHA256

          4bddd2e61ddc41167f02fe0971ab37d9f845e7b899ee9bb61749fb68edb707cb

          SHA512

          51fd14d0ce6ad4317048adf76d6be2c65255e34ccaf712a47b70ae208cf9218a933724bd8307336f0677ac4d99b005eaeea5057cdc4d84b1495448b874c4d24f

        • C:\Users\Admin\AppData\Local\Temp\TCD7104.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          ff03e448e7484bb289387c7a71165cbf

          SHA1

          d9ba05cce720a1374ddd854f733dce817b76ac35

          SHA256

          0dc3ca74480913ae59a8e94c973a866fa00eb2dc2d37cebc6a3d1f8293f94bb3

          SHA512

          d5caf5ae8a52f90c479f8eb5cea75291a018215d53400f5a79a9b1ce9a6d8a1c76f39a722b6d8f12411b23649b9a9f20d6f58cedc8c4e15b621ca14183f20b85

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          687ce4d2b0d6b71050f954e53e1041c9

          SHA1

          87431751f666ef2f7184caab864561ae72e2cfdd

          SHA256

          034e898afe0bf6bc4a023a7f3cbc71b59ac8c3bf88546524f837139e453f65f6

          SHA512

          61aa3cb39bd2cf8cbcebb7e3cd76e878fe63d4c3eba3fabfd336704278455870bce425fbf5a0465ac0e06fa0f9c65dfdac706e6533af27dd8f36dc009bdcb68b

        • C:\Users\Admin\Desktop\ResolveSkip.doc.exe

          Filesize

          512KB

          MD5

          b99aeb97414a0a6f581606f4d515d017

          SHA1

          3dc218d724b98f3f947dcb581b56fe3641aaaceb

          SHA256

          f2394b889ee9a8186d59cbe892b7bc664c840b489740ed89464e38d19e377103

          SHA512

          76d87df7be602856dd278131e1f16d5e544b6a0c0295b07be9337bf58cf1d7df6f94b0455ccd0a85eeab9adcca98259149a04394e5ee301aec235d4e91fb1066

        • C:\Windows\SysWOW64\aljzzmrt.exe

          Filesize

          512KB

          MD5

          ab139eab60a182c16051efe79846c921

          SHA1

          f8168dda295e2585099ee040e2f1329677be3f53

          SHA256

          65ae13ca38ef44bb13a48f2a6764f8004949cb50507c52ec4d81941efae6a164

          SHA512

          be210b06516c8c6adec50186563a4d6b70c40b9c4a336837ebbcbae82e0e48f21998d955598fc41cb43398166f6dee0d25eb0c157903467661cb7713fc8d16fc

        • C:\Windows\SysWOW64\llenkqobymangxt.exe

          Filesize

          512KB

          MD5

          033feaf34115554896f68bc6cecaf0ea

          SHA1

          3dcc64cc3bafe2aa3cac79d533ebcfe27d0e8270

          SHA256

          4444d22135d75d5c072714b59aa19419b62945f53c2f6ad418b22383a32a9ecc

          SHA512

          ae1f68b2a5f38d156e7a0b4f44eed896d0dda2e9da962dedda04f6b5501522bb6825bb434c3b2162b99694eaed026178d8ab2ea83dc16870aec233800c3f311a

        • C:\Windows\SysWOW64\vbgfxaovnozgb.exe

          Filesize

          512KB

          MD5

          24d567b4e49f609a1ab2641d1d52316b

          SHA1

          e58c57d6272c6889c2a9f17f64b233bbdce0b2f6

          SHA256

          be9ff497f015b9bec6916bc183a48d20acd408801b9eb115d543958d25c903a4

          SHA512

          a940d6685dfa3bb407172829d8d8cd6dfb559b25be75a5a7995215a63f9f3ee2ba83372703b11cb43ee6431c6dda41f0ec304a0891e385578f16f696796d2cb9

        • C:\Windows\SysWOW64\wrcetegoyo.exe

          Filesize

          512KB

          MD5

          66c11e91bb51280c6ab4d33b4dafe56d

          SHA1

          7a01f84be17b187a6c4987b768933b03eaedc694

          SHA256

          1b024c26408e7aa08bf6ee4ebbca9a6a1b50da1400520532b729c0c9318a8e85

          SHA512

          509ba6282cde1a3ed21705a44ba3e1bca4d1a69f67a9ac1ed1f22dff4b4fa41f60c6e253435d17871189b5044e0e9a703c00aec75ea161c5102f68e044fc07a1

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          434fd65ce4ff922354a7143c9cd8ae24

          SHA1

          753b8c4f33c648658a7c97e09cf71fdc4fc82da6

          SHA256

          1d38413f82b2a25f03c6c6b8f6cc405cfc7a77be034ebc6b805485c82ed49c22

          SHA512

          052ffec96363074f9dd516c680030828c28188daa97dc51c7bd2f176955dacd58e4e6155d543ac95065f0501fe96f5f49bfd07570713923d8949e9dc6591b5e3

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          58a9c9679ac1d04d035004256b4026eb

          SHA1

          dbc7fced6935209ec3e9e3e51c5956b87fbc77c2

          SHA256

          6133acabefca91159d4ea48962407300b4ad245680efe4422aad20765a7cf637

          SHA512

          85e1bc780af8ddc609d90ff6d38468830c50c49412ec471ab45c0810fde3e7be0b2a17f9417636567eea4b5a5e41f2c9c725d3409f7e2cacca890846f3a98ac8

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          8a773050b19cf6abe3383e7105bb819c

          SHA1

          e01240fd6866d67d7d27de843b37ee142641eae6

          SHA256

          deb2267377cd10535be19dc86d8e01d5e3511162ce952a007d332e18cf1a75dc

          SHA512

          61fad56c29153a36e3ab02c2796e832087373a6c134e76d8ad059e04c2f4005e1f72873168413bbe8bfbba2cf785aa6781db3e326e81f2ebc5b380903137430a

        • memory/3552-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/3668-41-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-39-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-40-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-38-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-37-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-42-0x00007FFB229F0000-0x00007FFB22A00000-memory.dmp

          Filesize

          64KB

        • memory/3668-43-0x00007FFB229F0000-0x00007FFB22A00000-memory.dmp

          Filesize

          64KB

        • memory/3668-601-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-602-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-604-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB

        • memory/3668-603-0x00007FFB251B0000-0x00007FFB251C0000-memory.dmp

          Filesize

          64KB