Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 04:03

General

  • Target

    4477999a03ba105e71476401b7cd3b71_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    4477999a03ba105e71476401b7cd3b71

  • SHA1

    d5b0153c777a1bdf577d4740a2584ba810ea34c8

  • SHA256

    e89894fbcb5fab3944987ad1d1eef88f05233e0950145c3bd88933f9c0ed789b

  • SHA512

    bf22c5bde8a528ef285ada1cd983a8c070c41da28915226e39bee6958d7cc5b974ede2481f348207d2b4babb05616ed4e570ae5f6e180a0f0f1a00a54adbeba2

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Z

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4477999a03ba105e71476401b7cd3b71_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4477999a03ba105e71476401b7cd3b71_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\vqjazzeaum.exe
      vqjazzeaum.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\ogqncgnr.exe
        C:\Windows\system32\ogqncgnr.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2372
    • C:\Windows\SysWOW64\vamhhspgtvwkgpz.exe
      vamhhspgtvwkgpz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2564
    • C:\Windows\SysWOW64\ogqncgnr.exe
      ogqncgnr.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2544
    • C:\Windows\SysWOW64\efbxffxpifvkv.exe
      efbxffxpifvkv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2456
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\ReadSearch.doc.exe

    Filesize

    512KB

    MD5

    ebbcd64c614d2d7737279c152f97a978

    SHA1

    47f8d28b2c7f7a70899805260a7417b2a81c5d97

    SHA256

    8570835b86149752ec10ee89a69554dbbfe453e8827766162bc6c37a9542dac7

    SHA512

    292f4f2a7ccd649d01c038118c7c8d5dcb6b4d907059473eef7c49abb000937bdef2022ecdacbf29b13b0ab7f42cb878a6441b00ec0da5eacc6d336d7bfa07c4

  • C:\Windows\SysWOW64\vamhhspgtvwkgpz.exe

    Filesize

    512KB

    MD5

    af79984518250a98681c4d33acefac14

    SHA1

    3e44c1500bf0882ee3826ff2573120950c283cd9

    SHA256

    884b16dd1adc1052e5b26edc13be7642862c6cddd1ded48bbf4e992927ea64b6

    SHA512

    a6f2f21ddb3f232bc17d765f223070a5a0a0acec197c1f9413b97402d55dd5ab334ca2aa23fbc74b5e89d63ade3f6449eaddf198d385bef6ca9651d09cfb5a63

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \Windows\SysWOW64\efbxffxpifvkv.exe

    Filesize

    512KB

    MD5

    987a48706d799ede30d76d9e3de121e9

    SHA1

    ec514aef22d8e41a9947228983fa6732fd67af03

    SHA256

    034906be34c183e12cf2f805bde98dd7674e2fd5ce74809d9991223e874ffb07

    SHA512

    529ea17e9f990a44a94baebb0d87d7fb110f6b5eed6a9d953169dea2fbaf5ef6db1ed63c7acd3e0bfb0b53c35ed42be9604e3c3788abe3c6160aeaa7a0aa1d15

  • \Windows\SysWOW64\ogqncgnr.exe

    Filesize

    512KB

    MD5

    85a833a20ef8381408a348bf02dd9c18

    SHA1

    a6d583b01e4c191d87c4d330e7bbb0467cd3c044

    SHA256

    919f5ae2a3937e3c79056ddcfaeea5edc82a1be7f29001679d713d41d349f5d1

    SHA512

    870881bf37719e79309ac2a18b795ad04602d97c1dc0a66a530da5ed769302983f1d9d4eece545f9e65dbeca946ea77b283db83562732c33c748fcfd90c11722

  • \Windows\SysWOW64\vqjazzeaum.exe

    Filesize

    512KB

    MD5

    ff434cdc7fa8a1fb1c7dab659c4dcce1

    SHA1

    8dec6e9d203514740be693884965ba7c6c0c0e96

    SHA256

    0cf43953ddd41c6716f9d435ca99ccd601a0af44b72aa1e8041cce40faa2aa72

    SHA512

    9beb9cae3a72e981167ebbc4c457ee6a30b0b975aa03783d84bc55d18b7ae44af5e43b89ed00925472816691edffe479144bc6fe2bedc11046c16fdf974cec7e

  • memory/2400-94-0x0000000003C60000-0x0000000003C70000-memory.dmp

    Filesize

    64KB

  • memory/2456-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2964-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB