Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 23:36

General

  • Target

    3d0a8983d1c76b9ac2c80e058138b16b_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    3d0a8983d1c76b9ac2c80e058138b16b

  • SHA1

    a4a38c96475bd49cb078c041011ccec3296915f6

  • SHA256

    e6bd8ad2ab36739fd045c556548d7af136e419669c8a2a9872a6c286ed30ac82

  • SHA512

    63330948e15c5c33c3761551515eb291aa709939b777fd531bfd6ff530832c2402d1270ab509b8a45a20878ef7646db55ed0fdc28a4bdba6d8d911d7987df65f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d0a8983d1c76b9ac2c80e058138b16b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3d0a8983d1c76b9ac2c80e058138b16b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\SysWOW64\qwtwrbrrud.exe
      qwtwrbrrud.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\SysWOW64\cnynvzvu.exe
        C:\Windows\system32\cnynvzvu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1156
    • C:\Windows\SysWOW64\euyacrrhuzufljb.exe
      euyacrrhuzufljb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4312
    • C:\Windows\SysWOW64\cnynvzvu.exe
      cnynvzvu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2616
    • C:\Windows\SysWOW64\ixeimxnewumia.exe
      ixeimxnewumia.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4372
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    3fa82850a647ebac0e679d5a3e6e9264

    SHA1

    7c5e87c43e7a26252dbedb4a43fae2a98faf6b0c

    SHA256

    ebb7adc7b1c784b48e3ba49e352df3510f75340e353b401b72aabd9d7e7a366f

    SHA512

    d26232d2d5444f37d5c959b5206a05563f205e84979c402129f836db37913df29df5270aac4cd2cc874d49dcf4ad3c17eeb3eaadc59bcf65572046d3c2b0f25a

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    7a226cf6a8fa0264abcc0deacb0f9d28

    SHA1

    2f7b85f9adcf135879ba7cefdcd7cd2d1a40f051

    SHA256

    b7472bb5c2c6546172489155bdd7a8029c5f91c3f4138bf090f2b3c977d9bc2a

    SHA512

    2ad9ddfd3a4ca60273a23baadafeb7e09d7a5c86b499d70d6f375a494b7d655c7cfa15eb05371fd4223e9292b6b0a816758f6b8b90097ea863cf61d88a5c09a5

  • C:\Users\Admin\AppData\Local\Temp\TCD9230.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    b33f6e45deec50a9483df28e49d60813

    SHA1

    f53d1441016c9090e0506b6d6dedee76a821ec8c

    SHA256

    9661fb3bb69f79e61f2151d4d078344d4cc6fca8cdd341056728f246a39e3a9c

    SHA512

    7eb697e2fc41d8238e4ed41cfb6b015b02ffc2b50b1b330fc829b06af4c7afd89da6b64a6e37d45a7b9582cd5926d28fbd94e5149374a5dc5b6f43a6ee58c254

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    0041cc0df394bb0b39cbfc2f07d81a44

    SHA1

    b6fffb15e3346b927f9bcfc17e681574dc8bf911

    SHA256

    eb03801d361d5d4b4aedd3e1ebf0932edc2637f72bb59669b99662fcd30497e9

    SHA512

    9de7cfd04486dc8ffac2fdfb25d533d27ee1dc1b4b46706d2d8039bc1b154a9d63ccf5ab4529cb6c491489e24f16828468e109b4088834a2ea1bce80180a2cf2

  • C:\Windows\SysWOW64\cnynvzvu.exe

    Filesize

    512KB

    MD5

    a395d786dd2e9e2efde82ce6cac25698

    SHA1

    a1242d5e044080afbafafd206a145d01772a1cef

    SHA256

    002165eec3b8a760eb171aaafc05ccb820528b60683733cc2ade40b49e27ddb9

    SHA512

    0aa10480056b8a7c4695bcf8a564f675faf4d7a69ef944c86835bfe8fe945adccb43a8ee6b704218d9687a5c05d96c61acf65d5c125f1502d557d4c03f39c85d

  • C:\Windows\SysWOW64\euyacrrhuzufljb.exe

    Filesize

    512KB

    MD5

    8ff7c3142cabdc7ee6d92fe19931a4fc

    SHA1

    c02a5ffb100cd61d54e084e24b06af588cb39ef7

    SHA256

    2282054338290f0c43df697fc7f67e7cdea0cc70454adb8740bb7618a1d52c11

    SHA512

    185731294be35811c734df5616669f46602e58e0e42d75951808cd061b6064bf6b9764e830941ec35d8f39eefbd3e9929d0a609786a14221a744b99f84c5e55a

  • C:\Windows\SysWOW64\ixeimxnewumia.exe

    Filesize

    512KB

    MD5

    f850aa6b3f7c66a87536ad0171275aa0

    SHA1

    d96cf5e0d969f6b28ca8fac54d84d1f683cf6a22

    SHA256

    d3e668772649cf90ada2ca9b852d352cb4d83dee14f1e76bc7cd6cfc9f2c61af

    SHA512

    3a5fe55fe16a8cee2507d602cf9690d3695302e2d96df48aaff8381249c57d3fb465f4f3abf6bad6831720f44b70ce4bca9557322c4e6b1e0094c9fedbbb80a1

  • C:\Windows\SysWOW64\qwtwrbrrud.exe

    Filesize

    512KB

    MD5

    b2275d36d3d86ee4d92d9bb626f8fb1b

    SHA1

    7b78c4c7c5d16c1170e820a5c05f0b937531416e

    SHA256

    89061796a25f69515fceb9565da9880fc2545e33da7a7a8f60869863bc93605f

    SHA512

    70ec1f3d85f1d8c2bab84ecc5279fb1b789bf81042d4f1a0bdc29ed0f44315aeabd342828a08be7a14db982c356632085f2344d92e442fa77de164c044357d25

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    13862c671d42e2b1ad74055f9c75aa90

    SHA1

    bdbd8be0b2d6411afc4a30f53388dda8af7a4262

    SHA256

    8f9d6d118cb000a1097191dd933496ac54c6388b4ecd447bbded11feabbdca7b

    SHA512

    a902b70cf4130fa2d84a65464eba9633c31d8b329aa0a3ea8970c42f7f49a2a2018f1ab328d49386f9d7e4df940abdece53955dac0f591c0bb3a30d83f91d1c7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    73ca0e334f89d683f68c682ff1cb4938

    SHA1

    d9f30c17df68a8a2dd8161718441e08aa879f544

    SHA256

    c788647fe7436fab0bf692d13e4880296ea275254da1f931c350b14434f3e81f

    SHA512

    a2eeb568e384f6de1395553201a61c4062637daf255c4aaeabcb60f5e06aa5a31803c46fafb66df842644f060b76772375789a7a4f381f489e36f33ce7568de6

  • memory/372-39-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-43-0x00007FF8C0600000-0x00007FF8C0610000-memory.dmp

    Filesize

    64KB

  • memory/372-38-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-36-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-37-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-35-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-40-0x00007FF8C0600000-0x00007FF8C0610000-memory.dmp

    Filesize

    64KB

  • memory/372-599-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-600-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-598-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/372-601-0x00007FF8C2950000-0x00007FF8C2960000-memory.dmp

    Filesize

    64KB

  • memory/1580-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB