Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 21:46

General

  • Target

    4d292518f430ad1925fd8b51ed0141b2_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    4d292518f430ad1925fd8b51ed0141b2

  • SHA1

    dc0167973a194d9b65f02f4334f75cea87c13cc0

  • SHA256

    e0d66954a042c5d00eda8d4033c043296cc2b4863916774e814b5dca862dc838

  • SHA512

    bf216f564eff2a57df17da3270f2778be07e3d0c86cb032e128f9310947084b9bd28dc24b22107dfba5d34c460150a050a30f13e5fa325d7c32dc5a2c334223b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6a:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm51

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d292518f430ad1925fd8b51ed0141b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d292518f430ad1925fd8b51ed0141b2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Windows\SysWOW64\zlzdlwklcm.exe
      zlzdlwklcm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\SysWOW64\qopyrwzs.exe
        C:\Windows\system32\qopyrwzs.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1592
    • C:\Windows\SysWOW64\vzzhgjfkrrcgolm.exe
      vzzhgjfkrrcgolm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3452
    • C:\Windows\SysWOW64\qopyrwzs.exe
      qopyrwzs.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5108
    • C:\Windows\SysWOW64\lgnmhhtqsanrk.exe
      lgnmhhtqsanrk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3696
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3196
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      ab41ee8806b2954d372bf77676005022

      SHA1

      8cac70a66636f991937e1ba27ea36931e2d15b67

      SHA256

      4855e160cc6afa9eff9796026f73e3f536f200c178c67dcd9186bdfcb3595d14

      SHA512

      fbe3e2f923deccc16197ee6b5d756271e5700f32a84d34b75172da2f247263697e5cca403ff5e81f0460b330c7eb31eba1fb3ad8f6e62a87dc5ed8e84568d55c

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      a868b46df40c5d46da42d9d0e1af982e

      SHA1

      e1e1313515a3dba158d9eae986237440150cc91a

      SHA256

      0881cbcd47199ccbcd7be88b280dfaaab11b82252f4deabd3f945570c3744de4

      SHA512

      23c60be0dc2e97d96f470533d92cd866e14d80065676905df1897968b649e96b5f262ed382ae4aebd5f7505e505260df6da9cbe3da4ecbbc73fd5d6b0bbbf8dc

    • C:\Program Files\WaitTest.doc.exe

      Filesize

      512KB

      MD5

      be6aeddbe9cc93636d84c38ceb199da6

      SHA1

      14452713adfb40e622b3c57e7768093f3df538f6

      SHA256

      cd0b58fb67687dd34baa91f3b9af82c7c41ec0c826c051972640e29792cee202

      SHA512

      c48d995e2d81c21a41710b0bf0f7bb97a0564e67e4951fb3297dc5b9ebd9f8404b392cb46ba6d88e1a62b1d1e1127233f952173f1613d56ba258e6603707fb56

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      9da633e10cf4137702026ffdc742dbec

      SHA1

      8fb1387358268e6a3e3ca02bc747e094f3cfdf31

      SHA256

      5e72418ff72959e3fafb060c0bc13b65a747159f0374c27f1c04bf992379b3b3

      SHA512

      2a294e8537e0cc7672e8d86ae7808eefd444b61b435f6245fc5657403a579c7aaca6feb3c1415ac81377d469812653a66a53dbe56e596634b03a952aa6953caf

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      46240daca298bc098af4c6f1d0183f9d

      SHA1

      05309dd50757fcadf4f9fa2f6eb65ab20a3dc766

      SHA256

      9df28f85d07ce292ae0c901cac43c14aa989809a54996b2dc22d64c99764454d

      SHA512

      de133a5d80441bb8dd3e42440bdce3e5a2e11c99931d7d3029e4efec14a660269c334279b31c8e72a7b37e953e790505f1dbd091595b6db3e35d4f07b88b530b

    • C:\Windows\SysWOW64\lgnmhhtqsanrk.exe

      Filesize

      512KB

      MD5

      650796c246941fbb1b315a7bb3fc83ab

      SHA1

      ecab4a7ce4d8ba86824162f0e644be9fac618f8f

      SHA256

      ff3843468e0a900371d9e09b8db8803a8dbc38b1d0c53e09e576d5947bbab3a0

      SHA512

      028a30dcd85f787a2caec46196928ef877ee6b889deca276b7b6ff5eafcf1b89a2536defd7b500e102c85b05c5df16f108d6cbb1e80445eab16ad78031e1a05c

    • C:\Windows\SysWOW64\qopyrwzs.exe

      Filesize

      512KB

      MD5

      b34b1834bb6b1cfa326824f2cc7a943b

      SHA1

      012ed5e020aa7ffbb41f6a2dbf6fa50025ca863a

      SHA256

      e02f4ddc4841a3a8202915308222927ee00aa62d6d2535419794270680f966fb

      SHA512

      b0009aad29723932527edba364fdd98d17755fa9791fd57774595f03a3a240dc2edbf4cc7ec515c4ee67bf0655db89bc2fe1177e7dfa74c589ca9fa07f3a70ed

    • C:\Windows\SysWOW64\vzzhgjfkrrcgolm.exe

      Filesize

      512KB

      MD5

      9283a108bdab27dc90700da8848ae4a3

      SHA1

      c785b1a5761beac0be6cd5a53fd35e8de58a0beb

      SHA256

      5e0a820854f6a551b94193c3136cc06a82549520ec55cf6b77ebf0fa7d029699

      SHA512

      a98cfd8af02f3da808b1969d9c7ca9f7722ba1c7859a77339375ae627e24940217d7733a07118e5b9d9f5f451bf24abb1d3ea6e50fb88dce3b74451af6694812

    • C:\Windows\SysWOW64\zlzdlwklcm.exe

      Filesize

      512KB

      MD5

      fdbe7b6bf6622fb3c90ce74745a43ebd

      SHA1

      32d8d380df5747f1b02a1854e78e30e089dd5e48

      SHA256

      f7b2f462e57cd0d72ecc5d3fdb85b305a08ecdb294c46cadf624636a03d6704a

      SHA512

      f83fd98491eaf9d54e53611c8d185b4a63dce50b6c708b4dfa5eee18030d5ea7ea275b0202043ec520b443bbcb81c92486a6d505ee30acfa7699e5a1efe69be3

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      139b27401cf20bb6de0cbd933888b0c2

      SHA1

      d33eaf971ed8c4742dcc77ccf4fe6db80c04b0f1

      SHA256

      7ae9befa3f26f1ab4abfe2abee959674ca03a5f2b60d9a3c88f574d93d64dfdd

      SHA512

      36300d0505cd96b2a415342930fd240660c4e5bf77d2669089fb942ad2bfe1a38109a73399be17da8b7fedf6a08b140e9ad44fa80f2773971e79164a5884966e

    • memory/772-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/3196-39-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-52-0x00007FFE68110000-0x00007FFE68120000-memory.dmp

      Filesize

      64KB

    • memory/3196-42-0x00007FFE68110000-0x00007FFE68120000-memory.dmp

      Filesize

      64KB

    • memory/3196-41-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-40-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-38-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-37-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-117-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-116-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-115-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB

    • memory/3196-114-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

      Filesize

      64KB