Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 02:44

General

  • Target

    44395757d2f92a2d6727e89e087888bf_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    44395757d2f92a2d6727e89e087888bf

  • SHA1

    8817185efe5650ef595a2608befa85784a0a159f

  • SHA256

    b3334dbff3a618a7278b17f5e938906f4608a320ae186374864bbe754e3e896a

  • SHA512

    6094e3089b6743946df4a581615ae2b74dcd72bb4fa8cd7a57ee92c50ea29cc5cb754d973ae77d32981abacb1e8e557967bf7a9052a2c2314e7a760834de31f1

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5D

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44395757d2f92a2d6727e89e087888bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\44395757d2f92a2d6727e89e087888bf_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\kfygakudrd.exe
      kfygakudrd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\lthldqbb.exe
        C:\Windows\system32\lthldqbb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1688
    • C:\Windows\SysWOW64\sejawqdrrrbvcjs.exe
      sejawqdrrrbvcjs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1792
    • C:\Windows\SysWOW64\lthldqbb.exe
      lthldqbb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1744
    • C:\Windows\SysWOW64\rclctxxwytvbv.exe
      rclctxxwytvbv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4480
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    8b3f7feb5104402905a3318fc67cca22

    SHA1

    96d6d2566814f173f476fa891c7b0d9b3074ae9c

    SHA256

    066b7462799abe387d4f62a4cf5cc4c09f4cd0d3bfcdd397349aafc08bc20b3d

    SHA512

    e84843518ce3f24aff11581ee655381819fd07e9695bbb25ec08ff718b445b7bdcf768a2ecbfa055bf895ee3b8de0371ae0b74a54650c9d7c3cfc47025b38b86

  • C:\Program Files\RenameJoin.doc.exe

    Filesize

    512KB

    MD5

    cf6827463cc8c9af108092b6fcca4bd2

    SHA1

    e5494376a47df9269a74e7ed12d651c1eda77c76

    SHA256

    552d80d2302a9d8cb832889b35304c21de9a5afad72ad4619cab296176c3f897

    SHA512

    8435eebda25d76bbdbd08c77731f39d7629cec381e4d3b7feaabdc850eb2cace311e859bf7dbd166627e26581adece291a75f2e5b1c1298720c927d1ec8778e4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    247B

    MD5

    ba31e27b309887962eae7bff5520de3e

    SHA1

    2bcf17b49c22ed6511df4c83dce94292deda7fc1

    SHA256

    9fe257af2a11412b5545d1b0296eea58fab5ed88df337aa6c7370c96b45368a3

    SHA512

    51293703930fea31241aae28446b0a98ea3505f632382671cef7fe870ee45712b09e44afec485c1650f3fc41e1a33449eb3cb7177d7e88a0a855e9db83163f8a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851218[[fn=gb]].xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    bcf208043b9c071da40e5c741664fed3

    SHA1

    e2ae2da7b31936e65fd0a9f6d8f1b69a55373630

    SHA256

    3abc6f01655f55990ba97bf009ce85829682e3ae2c30b53d8964a690ad1e4f3d

    SHA512

    c86932b1c5518991dc2b89a184163de8a0d1f1393b50198d8550b9d3bed0abcf78d2a82f0e227a3e4f9593d77501f46c6789da44602319316635dd6254790bae

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    2725a9cdceaad47d2f2e8f94c40f4433

    SHA1

    fd4b2d8cd9ca7b769d4cd45ed34dcf92fe8cbafc

    SHA256

    a475efc8dfee0a4db1c2bb59e89646fb9321ae05ce59eeaeab6ae207bd0372f9

    SHA512

    044391aedee3a49c4f7edd06595ce059f6ff11d6c71e50caf8521ae763e2b17740abd19a336fe6ec02e51d2080c0b563c59ed8bccdc7f7c6773960ac038a86c1

  • C:\Users\Admin\Downloads\ImportFormat.doc.exe

    Filesize

    512KB

    MD5

    f1a695650d411966bde0575d78d6b9ae

    SHA1

    b10bb903a393d7903729399c6d37f1af10e7b6bf

    SHA256

    c3c47ec45285878842dd25f1928556fbd7062791b97abfb46cb3d06304a17580

    SHA512

    427fb85be841f9accbe643f5610d0352ca8d9f447e7eafa67444657f1de5009bf5156621460d1f81edaee6db8da3d483fe054552d7d74935670a974702bdcb63

  • C:\Windows\SysWOW64\kfygakudrd.exe

    Filesize

    512KB

    MD5

    e28238101c17b9bc14b600f3204d612d

    SHA1

    e3232c6773f4f13ad60c87c3259648ebb0488338

    SHA256

    bad4880705509001d4d6547ae04067374cd65207459eb48eaf5327bc01385555

    SHA512

    1647ed6458cdbf18704a6475ccc9e7b0eac774964cfc8720133cf450b72dc04bcee8e74cbcf393bd01407dd0205d407eba8209bf5ffb7543ff6789b6d611ae52

  • C:\Windows\SysWOW64\lthldqbb.exe

    Filesize

    512KB

    MD5

    fbee832ceaa0aa1f6242386ce3b565f5

    SHA1

    6d49344b8954ca96d76fbe40c3a67789dc02eb10

    SHA256

    ae5970fe320cade17e554c9dd3e4c11c53d6bca93df4a8c530d5d94da696b792

    SHA512

    767026106d6dab386991658773f79f4e313852bf80a67d8be7e377071b458a518bd9e0bb624e77ecca428773179755b1c24b81e10855d38c243d2ad91786dc44

  • C:\Windows\SysWOW64\rclctxxwytvbv.exe

    Filesize

    512KB

    MD5

    85c2bcc7b214764e6695b2c9dcd1bd11

    SHA1

    45a92ddd7e5acc0d1930e47f72460ded4fe3210f

    SHA256

    459227e1446cf9b2ce129e4446386c48eb26df2925d16894f076aeb4a58b868a

    SHA512

    ae0adffeeb579b2f5fd4fb728b1c4192df89266e9a57daac23c812897aa6caef5cdc937f4c764757da9bb91669749cc3cafbd73ae05f51597e51b95f14287acd

  • C:\Windows\SysWOW64\sejawqdrrrbvcjs.exe

    Filesize

    512KB

    MD5

    2f64e06de60dba9f777ab4cea90c6683

    SHA1

    52aa10b9602eb65344f050775334590751408617

    SHA256

    132627b14f82d83dc74bca98adde8afbcf7ca5f25461e25d164c4a97eeca29fc

    SHA512

    a8800079112ba05772804d02a2b424b97e3559a592af64fa2e5d2554845eeaa619a8570e410d1ff1e10da3225a4223fe5cf7e1bd2823b0258349f2cc7b836b07

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    924185096f590aa2da1fa33327062fdb

    SHA1

    1fc486f3a1c9631ba5e03bca1317c70b01b0b97a

    SHA256

    fda6c54acfd818ae704225f8fb78021ff3774baf3abb361ab9844e64703f7d98

    SHA512

    f4718f14564c96a24a8a28e1c14cba738cf3e5afff3da8f4337fe7d0a8497c078114d66e0b4a51f100026e77a15d0e72c60adae08785243e29f233865b894781

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    9df97c9082cd3ff7b202a142bf838964

    SHA1

    2d26f5b8ccdebbfb9818818f996afa4d67d9bd33

    SHA256

    49d283a9e79d12076ecb48a2ea2b7c22de7f4b035da19fe24e1c365846914496

    SHA512

    5561eab84bf714d690f58996c1e169587b374deb6fbb32abf1509d0b08b9491ddb6a4c140ce68eb600147566a2b4e4517856fb4a24646004d9a05791c012f2a1

  • memory/1764-36-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-38-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-39-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-37-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-40-0x00007FFE52C40000-0x00007FFE52C50000-memory.dmp

    Filesize

    64KB

  • memory/1764-41-0x00007FFE52C40000-0x00007FFE52C50000-memory.dmp

    Filesize

    64KB

  • memory/1764-35-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-600-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-601-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-603-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/1764-602-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/2408-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB