Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 22:17

General

  • Target

    3ccb241fe344b7f7ecc2fd25e07db918_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    3ccb241fe344b7f7ecc2fd25e07db918

  • SHA1

    4c87c77bfac097e4ee10036fd265591540bfd426

  • SHA256

    296584ae480347959f258282a6ab5f81f7e9e90d5e29caa59f58f405b488f3db

  • SHA512

    7eb6243f9a2e0b09b16b16c124ab43ef8f551e8a5721eb346c4380d46a4ea9c6382fbe53e2567691b72de42dfc1e996245218d7a6519a4a2111031661c946664

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6s:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm53

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ccb241fe344b7f7ecc2fd25e07db918_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ccb241fe344b7f7ecc2fd25e07db918_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\nrbpepymka.exe
      nrbpepymka.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\bvvbbufo.exe
        C:\Windows\system32\bvvbbufo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2548
    • C:\Windows\SysWOW64\xvfsdhpewfcitgo.exe
      xvfsdhpewfcitgo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2668
    • C:\Windows\SysWOW64\bvvbbufo.exe
      bvvbbufo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2824
    • C:\Windows\SysWOW64\zjhthjkyqewfm.exe
      zjhthjkyqewfm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2652
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      3067dd657956a326d3dc86aeca7d90bd

      SHA1

      6ea3d277465e990881f8a42255041a526017a2ea

      SHA256

      4e347c2939ad861ffde79324bce7d281c2839d0469304a5dbdbbd00bc6592d43

      SHA512

      a342cb95c52cd5b665ad5ad1d8a8ad233d1bf2279350375702d694d6add05af520877534a26ea03fd36c15b5ab75a1de01687a3ed00167f3b08ec036b0aaf6d6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9abb10d0cb092b4ef2d0c727df50e71f

      SHA1

      fd70c1922e903f44c7569c2926045082964f14ba

      SHA256

      cf5d2323ff9006e18216d72ecea0cfb8b1a259699a90ef4c1fd4cc9a9cf9a9ac

      SHA512

      aa979cc4998768c53d9f21519c5cdec3223fdd8d13dbb56f13cfb550de01a5a142c50e701b1bc61e18c1bdc570b454d0f0bb3b2ff54dacdebc6ca56b7295219a

    • C:\Windows\SysWOW64\xvfsdhpewfcitgo.exe

      Filesize

      512KB

      MD5

      a5468c55f3f4de77e0ea6dad4de3fd9a

      SHA1

      a05c7e92a7035736682412a5a65d3dc5e52fbfde

      SHA256

      3161d83cbf68e7b3a157d81b5380da74f7a1c5eb327dec85f6320701b9644d9f

      SHA512

      9dcfb955cda051d418213fb189fca0e898f28c4bfc507d86e90aa95bb64bbc8c57055b3a02a6baf785b6ea5173206fc93a670a6701ecfbd5be732bb992649d3d

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\bvvbbufo.exe

      Filesize

      512KB

      MD5

      55a9326ba535e332d965cb2a6f16c5a0

      SHA1

      88c70ce9c5aa52fa4cc85c6890b6c06d03aad628

      SHA256

      90e97bcb78e99195e441bf129b08707617f670064241cb8de70bc8107003db7a

      SHA512

      dba62a7ca2e5af6adb7efe3cde63b5d3a704b0791aba30eca9e4b08ba3623c05a7a01ee0432fb2d99b37be0fb9878921b0511f9a15edb3272025c1d3dbc78da6

    • \Windows\SysWOW64\nrbpepymka.exe

      Filesize

      512KB

      MD5

      5c7a996ff409323f4c101013c1b2ec65

      SHA1

      0d0c7f50169d6f53ba8d1824cec61d522538e5eb

      SHA256

      08e8f50a76000ed03ade2d51b425ecb1a764dd0d070e6e035c62ea91bdf49c8c

      SHA512

      6be0499ef1b1fffe78031766c9e40b51081d4ef76cec880542d1c90658830669d39feb94da93a5e3aca2906ba458f4ab0887143b7d28f449f2dcbc2af69f36b5

    • \Windows\SysWOW64\zjhthjkyqewfm.exe

      Filesize

      512KB

      MD5

      69af57dda9689042ea3da67256ec67cd

      SHA1

      22f9c5d9c9b4e6dc15c0f5c7545ca8ab6cd69df3

      SHA256

      57e27603643dc7bf61ef7a29a270803ccec2eea3395924846241c3d6cfaa6261

      SHA512

      818bde1536fee4014af3fa7bfe3e666995988a8d2c6a3778aebbf130e40548c855b6b49972e3c92b4117bbbfda8847c0756f41c50e867916843e0959f2a21472

    • memory/2580-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2580-98-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3008-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB