Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe
-
Size
512KB
-
MD5
4583dc20ee9c673bfcd517fab7d88bbf
-
SHA1
cc4fdf65702ff682b9e1692ce83aa9d3e2828111
-
SHA256
478e070b3f86342ff2fc22562142633932121d6244bb55160ae4713159580cb1
-
SHA512
d06f549136eb15f83001f405a3005594b1544e9944c14c1c85eaf57079fe701ef03a729c29a5365321a63fd909f51b889a152ec16fd01f89c257056edd7c9d97
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6E:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gdprbmnqet.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gdprbmnqet.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gdprbmnqet.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gdprbmnqet.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 1452 gdprbmnqet.exe 1288 teuwlkgtypbfghf.exe 2720 lsdmxeuy.exe 996 raxsqytfplhzl.exe 4560 lsdmxeuy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gdprbmnqet.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ytwbmqoe = "gdprbmnqet.exe" teuwlkgtypbfghf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\palbxupa = "teuwlkgtypbfghf.exe" teuwlkgtypbfghf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "raxsqytfplhzl.exe" teuwlkgtypbfghf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: gdprbmnqet.exe File opened (read-only) \??\m: gdprbmnqet.exe File opened (read-only) \??\l: lsdmxeuy.exe File opened (read-only) \??\o: lsdmxeuy.exe File opened (read-only) \??\v: lsdmxeuy.exe File opened (read-only) \??\s: gdprbmnqet.exe File opened (read-only) \??\z: gdprbmnqet.exe File opened (read-only) \??\b: lsdmxeuy.exe File opened (read-only) \??\w: lsdmxeuy.exe File opened (read-only) \??\u: gdprbmnqet.exe File opened (read-only) \??\b: lsdmxeuy.exe File opened (read-only) \??\w: gdprbmnqet.exe File opened (read-only) \??\y: lsdmxeuy.exe File opened (read-only) \??\x: lsdmxeuy.exe File opened (read-only) \??\h: gdprbmnqet.exe File opened (read-only) \??\x: gdprbmnqet.exe File opened (read-only) \??\g: lsdmxeuy.exe File opened (read-only) \??\h: lsdmxeuy.exe File opened (read-only) \??\i: lsdmxeuy.exe File opened (read-only) \??\j: lsdmxeuy.exe File opened (read-only) \??\y: lsdmxeuy.exe File opened (read-only) \??\k: gdprbmnqet.exe File opened (read-only) \??\a: lsdmxeuy.exe File opened (read-only) \??\s: lsdmxeuy.exe File opened (read-only) \??\g: lsdmxeuy.exe File opened (read-only) \??\t: lsdmxeuy.exe File opened (read-only) \??\q: gdprbmnqet.exe File opened (read-only) \??\r: gdprbmnqet.exe File opened (read-only) \??\m: lsdmxeuy.exe File opened (read-only) \??\q: lsdmxeuy.exe File opened (read-only) \??\p: lsdmxeuy.exe File opened (read-only) \??\q: lsdmxeuy.exe File opened (read-only) \??\z: lsdmxeuy.exe File opened (read-only) \??\i: gdprbmnqet.exe File opened (read-only) \??\e: lsdmxeuy.exe File opened (read-only) \??\n: lsdmxeuy.exe File opened (read-only) \??\v: lsdmxeuy.exe File opened (read-only) \??\w: lsdmxeuy.exe File opened (read-only) \??\l: lsdmxeuy.exe File opened (read-only) \??\p: gdprbmnqet.exe File opened (read-only) \??\a: lsdmxeuy.exe File opened (read-only) \??\x: lsdmxeuy.exe File opened (read-only) \??\h: lsdmxeuy.exe File opened (read-only) \??\l: gdprbmnqet.exe File opened (read-only) \??\t: gdprbmnqet.exe File opened (read-only) \??\j: lsdmxeuy.exe File opened (read-only) \??\p: lsdmxeuy.exe File opened (read-only) \??\g: gdprbmnqet.exe File opened (read-only) \??\j: gdprbmnqet.exe File opened (read-only) \??\v: gdprbmnqet.exe File opened (read-only) \??\r: lsdmxeuy.exe File opened (read-only) \??\k: lsdmxeuy.exe File opened (read-only) \??\n: lsdmxeuy.exe File opened (read-only) \??\u: lsdmxeuy.exe File opened (read-only) \??\y: gdprbmnqet.exe File opened (read-only) \??\k: lsdmxeuy.exe File opened (read-only) \??\z: lsdmxeuy.exe File opened (read-only) \??\s: lsdmxeuy.exe File opened (read-only) \??\e: lsdmxeuy.exe File opened (read-only) \??\m: lsdmxeuy.exe File opened (read-only) \??\e: gdprbmnqet.exe File opened (read-only) \??\o: gdprbmnqet.exe File opened (read-only) \??\i: lsdmxeuy.exe File opened (read-only) \??\u: lsdmxeuy.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gdprbmnqet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gdprbmnqet.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3980-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0008000000023413-5.dat autoit_exe behavioral2/files/0x000700000002328e-18.dat autoit_exe behavioral2/files/0x0007000000023414-27.dat autoit_exe behavioral2/files/0x0007000000023415-32.dat autoit_exe behavioral2/files/0x0002000000022975-60.dat autoit_exe behavioral2/files/0x00020000000229c8-64.dat autoit_exe behavioral2/files/0x000900000002332b-71.dat autoit_exe behavioral2/files/0x0009000000023426-91.dat autoit_exe behavioral2/files/0x0009000000023426-450.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\raxsqytfplhzl.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lsdmxeuy.exe File created C:\Windows\SysWOW64\gdprbmnqet.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File created C:\Windows\SysWOW64\lsdmxeuy.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gdprbmnqet.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lsdmxeuy.exe File created C:\Windows\SysWOW64\teuwlkgtypbfghf.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\raxsqytfplhzl.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gdprbmnqet.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\teuwlkgtypbfghf.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lsdmxeuy.exe 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe lsdmxeuy.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lsdmxeuy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lsdmxeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lsdmxeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lsdmxeuy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lsdmxeuy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lsdmxeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lsdmxeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lsdmxeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lsdmxeuy.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification C:\Windows\mydoc.rtf 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe lsdmxeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe lsdmxeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe lsdmxeuy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F88FFF94F2882129040D62E7E91BD92E632594B674F6234D798" 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E08168B1FF1A21DAD27DD1D68A0F9116" 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" gdprbmnqet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" gdprbmnqet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs gdprbmnqet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg gdprbmnqet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C7C9D5082226A3E76DD70512DDF7DF465DD" 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8FAB1FE13F2E7837C3B4A869C3E95B3FD038D4311033FE1C942E808D3" 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B029479539EF52BDBAD733E9D4CF" 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh gdprbmnqet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc gdprbmnqet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf gdprbmnqet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" gdprbmnqet.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat gdprbmnqet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gdprbmnqet.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193FC6091597DAC0B9CC7FE1EC9E34C8" 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" gdprbmnqet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gdprbmnqet.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3092 WINWORD.EXE 3092 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 2720 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1288 teuwlkgtypbfghf.exe 1452 gdprbmnqet.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1452 gdprbmnqet.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 1288 teuwlkgtypbfghf.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 996 raxsqytfplhzl.exe 2720 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe 4560 lsdmxeuy.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3092 WINWORD.EXE 3092 WINWORD.EXE 3092 WINWORD.EXE 3092 WINWORD.EXE 3092 WINWORD.EXE 3092 WINWORD.EXE 3092 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3980 wrote to memory of 1452 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 82 PID 3980 wrote to memory of 1452 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 82 PID 3980 wrote to memory of 1452 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 82 PID 3980 wrote to memory of 1288 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 83 PID 3980 wrote to memory of 1288 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 83 PID 3980 wrote to memory of 1288 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 83 PID 3980 wrote to memory of 2720 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 84 PID 3980 wrote to memory of 2720 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 84 PID 3980 wrote to memory of 2720 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 84 PID 3980 wrote to memory of 996 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 85 PID 3980 wrote to memory of 996 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 85 PID 3980 wrote to memory of 996 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 85 PID 1452 wrote to memory of 4560 1452 gdprbmnqet.exe 87 PID 1452 wrote to memory of 4560 1452 gdprbmnqet.exe 87 PID 1452 wrote to memory of 4560 1452 gdprbmnqet.exe 87 PID 3980 wrote to memory of 3092 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 88 PID 3980 wrote to memory of 3092 3980 4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4583dc20ee9c673bfcd517fab7d88bbf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\gdprbmnqet.exegdprbmnqet.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\lsdmxeuy.exeC:\Windows\system32\lsdmxeuy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4560
-
-
-
C:\Windows\SysWOW64\teuwlkgtypbfghf.exeteuwlkgtypbfghf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1288
-
-
C:\Windows\SysWOW64\lsdmxeuy.exelsdmxeuy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2720
-
-
C:\Windows\SysWOW64\raxsqytfplhzl.exeraxsqytfplhzl.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:996
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD54b207314bdd7ec8114bc5867fe964e9e
SHA17d6f16fb733ae9a4b0067580f459e411878499f4
SHA25628dc6caa0eae0576e58b2711f3ae9fc51302eb0e940d5559602e22afa1076b50
SHA5128663804d9a38d5a14dc932ddc11cacc012882c5e8a9020cb9fd590a51c5149df4a219dcb79ce24cadf28bbf2ff1934a7506695830719c54406bc3f6324d7fe94
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD5d0e985a23599c00e92858891b7fbe5f2
SHA1b3e6b46b4a644986829ca86360f0505d42e08280
SHA256224bdac9df25d6bb70e966203956e604addd1de10579514b5a7275a4f470d981
SHA512adce27426374abf34f824c0a994cec851ce811b0d01616c6a241db182c98250e61aa40cf835c565f3610ea03678df4552364a0eba183d4f348890caa14dc6992
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD50d4bbb41bcd7637e5c50544887bfd4d9
SHA12993054b24a01191d5c6931072966d52e45703b2
SHA256adfbbd673a78e476aebfa5d467fa83643802016cbb20e555d5ac6c1dbbe7206a
SHA5122a50ab9b3971949d7fd38e7cb4a7483bd5b25aadf597e7e1afdf91b9527ecef55b420937921156c8b5c7873c65c5e4ace6bfd1d62442c35a73791ca4576d69df
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD51ae48c08f9173f46cd7998e5a731d187
SHA1439f6cd580804528e6c7307baa7887e9a3d568fe
SHA256c10dd0023743f0027e8dc36879e6953f97183f6097c3c47b734de4c2e751f736
SHA512184e8718af828552d9dd9e158b619b1f5b74f05f3e0a9e8325cc6dc601d6eada7ad4ac5dabc0dcb835365f4c695c23564a07cb724bd39cd9a5248f519f43427d
-
Filesize
512KB
MD58fd9c5a74546751e11e248b93d543101
SHA1d4d9702e600f53e83ff43360e28890addb4ae80c
SHA256f93089638b646d32a791287f4526f4060a5a840aef5b0e4bd2162b367053451b
SHA512082d8c15a8ca6fa1c3585b14a056cb53ce946d393007ad2b16bffa46b231ee6a41c08b36e3edddbbde880c55373ce7d82ced5a9f34013abd6895912a42941108
-
Filesize
512KB
MD5e4eda183fa2a13b46aa883325270529e
SHA11c0f62ba3329ab40750881c3f024c6e62cb4a169
SHA25630b2fe84708eea1a79a6bc9d63188cca35c15eb159e85fdb92a1f69680571618
SHA512a1d371fccbd1eae4928a58ae8afca086066ae9779e24a1894d2aec9646273f2333777ccb0e5506204c7294a9d59c3560695e4669578d7e2c58a222e397317632
-
Filesize
512KB
MD557211bec8187c4875de1f7582b0d9244
SHA13dad6ea98ab67d64b6e0ad5d746572a5b899bc33
SHA256485c605b59a92a8e57e3054b33aeec6fa7e53f8a73bc093547985372b142458f
SHA512703305bbe9d2c7f99ac4e033f612d8320f9a232753ea397de5f82f593a8237acfb5163319d15d3bfddf715daf3f550d48da32a10fccd1695deffecfaaa6ca467
-
Filesize
512KB
MD59b0e1da79f03fb6981b47b42b8162737
SHA161b47ed3e7dc932e2d7fa65ed9026bff6ef2c712
SHA256ffa5c2bcfef9f3647bee7320bc83238bfc509a3eb133225c8efac70ecaf96eed
SHA51250c42e62fba5fb2f823e2149c6216195fcee7e7d68d6dcecb7846c8a64fd379c2dee372294a2017c56740829203110174b0b20438a877e73b2461484872c902c
-
Filesize
512KB
MD5604a5fe2ee29dc7bb6656bbeabc7bb0e
SHA1698664d35d38e06a3948aafa6c44e7963784ccd4
SHA256fbcc2ebb5e8b1f44bdbc8a366ffa41dfc1c94dcf6753cbc04bd2755860e5d270
SHA51249e25fa7754aaaf5fc53a450741720305df7273fb0b5205ee3f59a6252fe641a5ba9e1f660badf39e068fe26f46d5cc11f94b05b17cd0d77d08dc4393a01eb8f
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD51d239499e4d1717385471023024a7248
SHA1ce80c05c146aa8a85ac354d2483d85b51a1c0c36
SHA256911b9e759b874203c2df6fb832c195fd7227bf5848ae676c984c99f4901b6d79
SHA51281efc6a46dd3dfdf04e41a4729af4595ba85d8da7005d8f9b198f7685ca5f472314b0508e806cdd6f96a271b09f4ced051bb7234cf8dc384f16b381e23edda6a
-
Filesize
512KB
MD5de37ffd864b401d2703c3cc55324c51b
SHA19b0380a37b481bc9f49ecbf782b48a8f2356e08e
SHA256c5c0c74087612de457f9c5d625d7d7f155c1465a093fb568a30817fa3b3fc087
SHA512fce6b736defb0ab7e0792dced0e8e8058611e158c5ff1717d3eeb269365951a5c54233eb6db9b16039fb0f7855b1c98be620bee45e49b9d89614e6339d099fbc
-
Filesize
512KB
MD5b0255a0e6c479585fb1c9ffb1ffb7e26
SHA13e7ec1f467735649f056a3288efc01de35142600
SHA256227845564136b3650819a46436a00d8c9d0e5e5286adf1d9a7c118eebe127449
SHA512cc5dd842c19e9c526b4c31a48ee899bf6fb69057f5e728e90df526b27396f8b618c9cc3127e5853d85fba083895464202bc2929d0c1a8a4e951ca021e8ce3bb6