Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 05:14

General

  • Target

    498c203823860db2f46727a4af66c609_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    498c203823860db2f46727a4af66c609

  • SHA1

    33266b4e95cd922a4cdf79e0af69e7af7c8ca0a4

  • SHA256

    1eaf2f1c592101e47b2c21b5d0574cc549b8c23f7eb2ae86f5bf6c7927941d25

  • SHA512

    17736328b3e0c1067eeff846431bdd63909c9ed89492b7f7ff60e2705a419500aa707aad2d4b79b538aad5980478380791dd4804a1fd747acde9d026194c447f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5P

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\498c203823860db2f46727a4af66c609_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\498c203823860db2f46727a4af66c609_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\riwtbeqnes.exe
      riwtbeqnes.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\SysWOW64\oprmltsh.exe
        C:\Windows\system32\oprmltsh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2444
    • C:\Windows\SysWOW64\odvbhzoviacywoe.exe
      odvbhzoviacywoe.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2692
    • C:\Windows\SysWOW64\oprmltsh.exe
      oprmltsh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2556
    • C:\Windows\SysWOW64\tgcqjudmjjmij.exe
      tgcqjudmjjmij.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2688
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      8e0045eebad0bde073a2a42e3784d83d

      SHA1

      d208a93b8b38a1156f785d92adcf9513df01a954

      SHA256

      45e6231daee45cca00508dbd702ea59f2a66e384d0f923b59dfb2a035a23f6fe

      SHA512

      ef66ac41f3abf7469da6131fca29d7ee99645d0002b3e3211632264bd00b1116ec444e4975d5dba89cfc8a6db660270dc5ae4680b70d55fb73f135ce8614c22b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      2d9b6359e33880201cb1d1c00ac1b7ee

      SHA1

      158de5b335711d48a109de2c26058a1cb8b8bb41

      SHA256

      a78f4b916ad60401ac32b280a8bd0339ee8f8e3aab9bda7f9f6d1b5ace258e5f

      SHA512

      3a1c0b8591b1dd5b5f9629b1d6355238109078b4d2755a2c967b566aa62ea23a9d085e1cd2ef7ffef228017e104e77eaa07342bb2d1f281965d84c5e5ac66d24

    • C:\Windows\SysWOW64\odvbhzoviacywoe.exe

      Filesize

      512KB

      MD5

      a29c1856448acc55eeb03d44ca3a113f

      SHA1

      4c80cab914e580819e2b554c205061397945164c

      SHA256

      db3fa5f53ffc512cc5f69ab716e0fbfb5f5d9528a9d9e70b369a9139fa84aa3a

      SHA512

      8222718c39f77e523e0d527e7f4c8351a2d6fdc66ae6ce12774bbcb1341379476d0ff7b7a7d86ad053c9b3337b6c5846dfb9544b81299e511cac6b58137a75ed

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\oprmltsh.exe

      Filesize

      512KB

      MD5

      3ed8bc79c3e74c93ebbbcd503fc50d70

      SHA1

      bda1f409b1fd837aa5fa9618cb18b6cca5e8f715

      SHA256

      9cc1372b442338644da5fa5c92fbda543212e8008556d99397bee53405fe86e0

      SHA512

      fcaff9e21cae4e6eb4748f57f59e1655904f224594cf90fa664b57b54d149809050fb221017fdf84330db81da1cf29857798a54a6aee7ee20a89b10a45912c09

    • \Windows\SysWOW64\riwtbeqnes.exe

      Filesize

      512KB

      MD5

      d0a8271a23c054c9e4d5a4f54d4d2dcf

      SHA1

      13ec4a1b9181f06db50c381a5ec2899d30590565

      SHA256

      64b5262905799c282e4d4e51e5ee5d86bfba4e1da0e062babe3e2cffeb8209b1

      SHA512

      7e3977a577c1813746b88e20218530dd92ba390403292fed9b82c8dab4c138db77e7142be52b053c5098cd76dee0b2cbe4644ae56e4f4b6eb91047601a755181

    • \Windows\SysWOW64\tgcqjudmjjmij.exe

      Filesize

      512KB

      MD5

      3c7c6bc175c08eba64c121b639125dcd

      SHA1

      b7223c946f68a9d10d8f05251deee14d400841c7

      SHA256

      5803d94734be463739b35914f77b38569b9687ce1018318151370b3939eb27c8

      SHA512

      7382296e63bc374d880c856ae373de53a98cc08664370b414316a53b943b47a767c1b84de9f502977ffb7c2dff215aa60ebdab3c6d98092974fa1734e310cd97

    • memory/2416-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2416-94-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2488-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB