Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 01:40

General

  • Target

    3d6a2ef0df4cb9a9a085942bd58b8622_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    3d6a2ef0df4cb9a9a085942bd58b8622

  • SHA1

    9249a03a64c4ba4d8ca1b72c86f3c1716b3c1e10

  • SHA256

    5b3211ed5c341c42ae0e97ca9a1e38073d3b0bd94c37b8c997a5aece5439082b

  • SHA512

    7201e34a6433d8a4b740d6c30b92c012eb5fe60dbf3731b40b917051d21ae77872685f0f278f07f6c96c1d27bd469dc7fe8c25bb2e4b681b081c8ddb8dc2e5d3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6i:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm51

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d6a2ef0df4cb9a9a085942bd58b8622_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3d6a2ef0df4cb9a9a085942bd58b8622_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\kvjjdmcwtm.exe
      kvjjdmcwtm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Windows\SysWOW64\ppszkwvi.exe
        C:\Windows\system32\ppszkwvi.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3740
    • C:\Windows\SysWOW64\smjrtrazlrshyma.exe
      smjrtrazlrshyma.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:628
    • C:\Windows\SysWOW64\ppszkwvi.exe
      ppszkwvi.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4460
    • C:\Windows\SysWOW64\mbxetsjjjgyua.exe
      mbxetsjjjgyua.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3140
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          cfb3e36aa4f49c4c643f6fa85c135dbc

          SHA1

          e4447a372cae8f61e8ef6746cecebb2de9badf16

          SHA256

          0f577cf7ba0081e29ac86538e2d95cb1a8e8fb61a726e8c7ae93b4f20bb29cf0

          SHA512

          c080995dd425267bb6930d5971957ba6a91d1c20f3243ca9cff994c9569b45176c9ff00736949c05767f3030eb5a3c0436a7f8aed685ff16e24d6a740810a54b

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          7360baea468754fb1c84ec25e735e7d0

          SHA1

          2042aa47305345d4275e58c16503416873250c48

          SHA256

          1c486168b5cb4a9b0e0ab023dfb1dcc72a179deaabd6a749c34d38174bf920c0

          SHA512

          b109ab2b0c9f66a0777533af2ec0a8477d463d853a60a7d9268e671ab15b5d1d17cab7888911f12a8dca2c605c0faed69a8d3a458196aa68daa398e792153ff6

        • C:\Users\Admin\AppData\Local\Temp\TCD8C94.tmp\sist02.xsl

          Filesize

          245KB

          MD5

          f883b260a8d67082ea895c14bf56dd56

          SHA1

          7954565c1f243d46ad3b1e2f1baf3281451fc14b

          SHA256

          ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

          SHA512

          d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q9CR2JOTA1XT4KCZZBNI.temp

          Filesize

          3KB

          MD5

          3f14e512b4f5959a9995b68b8a9b5c68

          SHA1

          ca6824bfdeffc9fd03cf2ecc4e51f19529bc4335

          SHA256

          0457d3baa2d22f03772ab92e8142ef265654b47eeb92f188889595fc7af7e532

          SHA512

          c99f0ad3b9f8fc8805b92aeb006c7b782d322f06dcb2da29563ffb8f75b8e80cc5add67a8b2e82b65fa91448b9866a6fb8f6cd81a70d7febefa171b930c2803f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          f0f46d6128170e1b37f51f72818b8828

          SHA1

          23412ea07419e656be1e47fcd0b1022b6ed7b6d9

          SHA256

          f16b228ba5d2de39a19dd3e164dd277ad21ba51f5127bd2b400f43c39945e111

          SHA512

          3a6595572d3200a68ba2f3904ca51565c1b9b1167d8578c9b8deb9a8855bba80527eb43e90669b62cb13e9d06f8569cbf65cb2dbe3627cfd3db768df74965e89

        • C:\Users\Admin\Desktop\RestartAdd.doc.exe

          Filesize

          512KB

          MD5

          46c15e8d515455cb8674bfed413c8c35

          SHA1

          ecf8078f19f644b10d6f1052ba897308aa462b7e

          SHA256

          37d9fd92e5032f68786d81023919fb17ad3a2cdbeadf2ada51eae620cd622c42

          SHA512

          b4859f8cfb0775bafe89598c9dfde636b6a7e5826b1a11a60c2fc679b9094550eb3dda6e5db164579506b7e0ad8f9a0f01b87be874b87340e358be055fd57b53

        • C:\Windows\SysWOW64\kvjjdmcwtm.exe

          Filesize

          512KB

          MD5

          57e10d99e2b13d207216514f89bf914e

          SHA1

          70c481a8d4bc3b9aef0d27d7b48de07c1ae5757e

          SHA256

          6c73eba134adff855f7f258c6d44661b5d8ceb607bca46b999bfadd09bfd1747

          SHA512

          21734525325a8bded4e26fe0bdb9c86eade9b3d4164bb04abd0ce9c35309e241ff7079d456e043d92548c488eefa21fb0a03b817888afaf151b0db4d1d319482

        • C:\Windows\SysWOW64\mbxetsjjjgyua.exe

          Filesize

          512KB

          MD5

          a201783cd87f5fed22e47abc9e50e5b4

          SHA1

          5bb23fff81a602c81fba04dee5395cad4e9c15cb

          SHA256

          a603704b8fb5a153f2190afd369b5c4ba37547ae04a347a55763cf7809d411f8

          SHA512

          24fc59233bd8221c585089258e582dfd19844d881d758760f34e32141c7a87027910d6de804d447da971b5665c66da22112e5ae837775641187dfcccee0b707a

        • C:\Windows\SysWOW64\ppszkwvi.exe

          Filesize

          512KB

          MD5

          a455d4e312e74ca745df61a9371ccefd

          SHA1

          fa3f833cb138529c2ec4ca509a9f01766f38f525

          SHA256

          6956cf1a4e6d6c805edb85716bfde20350fdc51dd18baeb692e3aef2f371b484

          SHA512

          67b3e33c40a078211770b0f9dbe7ee7ea60f335ebb776197ce34809e4e75a8643980580d383ea0be56dbbd25ca06ce4d12712fca61e20c828a1a5b49dff4f96d

        • C:\Windows\SysWOW64\smjrtrazlrshyma.exe

          Filesize

          512KB

          MD5

          de5eb69fc0ac81d3cf9e80c59e2bbd7c

          SHA1

          fd8ea4d6144695bfd6db80f38f926e02e8b6a2d4

          SHA256

          c6fbc2793076016832336dcaaff23651b8c2afe1f9b20da16250b867b666369d

          SHA512

          86a955aa242f36d5e5c42e6d31fef89c7975a0126a420ee86fa1c2ad18a21de9cf69670561ad6b9738cec1ff04dc3531cd49d88109281521d0d6c9ce8c94ebf0

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          f65c03a33eef77a96995ae9966c5a383

          SHA1

          e5754839aef781bc1babb8f36252f9db1cbaecc6

          SHA256

          6421367b17a193374ec1080c91b3b3d905bfffe99d8e2c6d21218540b82f9bbc

          SHA512

          8526c5d3f4c706d44709a7e8b9b3970c673fbe14b892d4809284d69eac7b0db398ebc16964f10bf6a9535a5d62f13c14d69983ea7a0910685e3d237bd2b54eb8

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          3b7b458f0109484377ab57bd63f3bc75

          SHA1

          3c535ba04f1cb7e68f725aa08f77c44c5077c825

          SHA256

          0ac14e36efaf9159c62fdc5ad2495d058847871f1b6a1841b5e660028c49a353

          SHA512

          c20d84540a6e437e17287633fd67a644142257fd4054e6d04daf9cf78a4f3c5d7da60b680edeb3351c79118abb13b9ed2e3fac8b58922c599ec814aa3a4a669a

        • memory/1924-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2932-41-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-40-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-38-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-39-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-37-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-42-0x00007FFB1F000000-0x00007FFB1F010000-memory.dmp

          Filesize

          64KB

        • memory/2932-43-0x00007FFB1F000000-0x00007FFB1F010000-memory.dmp

          Filesize

          64KB

        • memory/2932-600-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-601-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-603-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB

        • memory/2932-602-0x00007FFB21850000-0x00007FFB21860000-memory.dmp

          Filesize

          64KB