Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe
-
Size
512KB
-
MD5
49b906b73640866936f17c7b6b9dd88b
-
SHA1
d37069d851ab913e06a657065d494a6324db9337
-
SHA256
4c2b1ea41b077f68cd3e23c183e1054a65c7c3039eb3c535e50d339b6bace341
-
SHA512
32752875b11178ebd7118635c3ee4f2a43732fc6d7e63416f3b8d0323222ef5f9bce83760c0b0e3d14b3d08774b5677b363bca32c90e97de3318f8f00c39d0d4
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5a
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" oldvozrhfy.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" oldvozrhfy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" oldvozrhfy.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" oldvozrhfy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 1844 oldvozrhfy.exe 1508 xuarwehvfabpiec.exe 3116 fdskgpoz.exe 3112 ufqkymchoxuwx.exe 2464 fdskgpoz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" oldvozrhfy.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hvnoogzm = "oldvozrhfy.exe" xuarwehvfabpiec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wxxuhhmo = "xuarwehvfabpiec.exe" xuarwehvfabpiec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ufqkymchoxuwx.exe" xuarwehvfabpiec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: oldvozrhfy.exe File opened (read-only) \??\w: oldvozrhfy.exe File opened (read-only) \??\y: oldvozrhfy.exe File opened (read-only) \??\a: fdskgpoz.exe File opened (read-only) \??\s: fdskgpoz.exe File opened (read-only) \??\y: fdskgpoz.exe File opened (read-only) \??\n: fdskgpoz.exe File opened (read-only) \??\b: oldvozrhfy.exe File opened (read-only) \??\v: oldvozrhfy.exe File opened (read-only) \??\k: fdskgpoz.exe File opened (read-only) \??\m: fdskgpoz.exe File opened (read-only) \??\w: fdskgpoz.exe File opened (read-only) \??\x: fdskgpoz.exe File opened (read-only) \??\m: oldvozrhfy.exe File opened (read-only) \??\m: fdskgpoz.exe File opened (read-only) \??\p: fdskgpoz.exe File opened (read-only) \??\w: fdskgpoz.exe File opened (read-only) \??\z: oldvozrhfy.exe File opened (read-only) \??\s: fdskgpoz.exe File opened (read-only) \??\g: oldvozrhfy.exe File opened (read-only) \??\k: oldvozrhfy.exe File opened (read-only) \??\o: fdskgpoz.exe File opened (read-only) \??\t: fdskgpoz.exe File opened (read-only) \??\x: fdskgpoz.exe File opened (read-only) \??\z: fdskgpoz.exe File opened (read-only) \??\u: fdskgpoz.exe File opened (read-only) \??\h: fdskgpoz.exe File opened (read-only) \??\i: fdskgpoz.exe File opened (read-only) \??\l: fdskgpoz.exe File opened (read-only) \??\r: fdskgpoz.exe File opened (read-only) \??\b: fdskgpoz.exe File opened (read-only) \??\p: fdskgpoz.exe File opened (read-only) \??\v: fdskgpoz.exe File opened (read-only) \??\o: oldvozrhfy.exe File opened (read-only) \??\t: oldvozrhfy.exe File opened (read-only) \??\e: fdskgpoz.exe File opened (read-only) \??\a: fdskgpoz.exe File opened (read-only) \??\b: fdskgpoz.exe File opened (read-only) \??\u: fdskgpoz.exe File opened (read-only) \??\y: fdskgpoz.exe File opened (read-only) \??\a: oldvozrhfy.exe File opened (read-only) \??\u: oldvozrhfy.exe File opened (read-only) \??\n: fdskgpoz.exe File opened (read-only) \??\r: fdskgpoz.exe File opened (read-only) \??\z: fdskgpoz.exe File opened (read-only) \??\p: oldvozrhfy.exe File opened (read-only) \??\r: oldvozrhfy.exe File opened (read-only) \??\i: fdskgpoz.exe File opened (read-only) \??\j: fdskgpoz.exe File opened (read-only) \??\v: fdskgpoz.exe File opened (read-only) \??\q: oldvozrhfy.exe File opened (read-only) \??\g: fdskgpoz.exe File opened (read-only) \??\j: fdskgpoz.exe File opened (read-only) \??\k: fdskgpoz.exe File opened (read-only) \??\o: fdskgpoz.exe File opened (read-only) \??\q: fdskgpoz.exe File opened (read-only) \??\i: oldvozrhfy.exe File opened (read-only) \??\l: oldvozrhfy.exe File opened (read-only) \??\n: oldvozrhfy.exe File opened (read-only) \??\s: oldvozrhfy.exe File opened (read-only) \??\x: oldvozrhfy.exe File opened (read-only) \??\l: fdskgpoz.exe File opened (read-only) \??\t: fdskgpoz.exe File opened (read-only) \??\e: fdskgpoz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" oldvozrhfy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" oldvozrhfy.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3012-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0009000000023405-5.dat autoit_exe behavioral2/files/0x0006000000023266-18.dat autoit_exe behavioral2/files/0x000800000002343a-28.dat autoit_exe behavioral2/files/0x000700000002343b-31.dat autoit_exe behavioral2/files/0x0007000000023449-60.dat autoit_exe behavioral2/files/0x0007000000023448-57.dat autoit_exe behavioral2/files/0x0007000000023457-75.dat autoit_exe behavioral2/files/0x000b0000000233aa-93.dat autoit_exe behavioral2/files/0x000b0000000233aa-95.dat autoit_exe behavioral2/files/0x000b0000000233aa-103.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll oldvozrhfy.exe File created C:\Windows\SysWOW64\xuarwehvfabpiec.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fdskgpoz.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File created C:\Windows\SysWOW64\ufqkymchoxuwx.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fdskgpoz.exe File created C:\Windows\SysWOW64\oldvozrhfy.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xuarwehvfabpiec.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File created C:\Windows\SysWOW64\fdskgpoz.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\oldvozrhfy.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ufqkymchoxuwx.exe 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fdskgpoz.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fdskgpoz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fdskgpoz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fdskgpoz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fdskgpoz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal fdskgpoz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal fdskgpoz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fdskgpoz.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fdskgpoz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fdskgpoz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification C:\Windows\mydoc.rtf 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fdskgpoz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fdskgpoz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fdskgpoz.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fdskgpoz.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fdskgpoz.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fdskgpoz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fdskgpoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B12E449439E953C9B9D2329AD4CC" 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" oldvozrhfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBDF9B1F917F2E0840C3B4486EC3E97B089028A43110239E1BE429E08A9" 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193EC7791493DBBEB8CC7C95ED9334C6" 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF4FFF84F58851A9031D72A7D96BDE5E13D583066426242D69C" 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33372C0F9C2D82596A3377A177242CD67DF165AB" 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78668B3FE6A21AED27FD0A98B089167" 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" oldvozrhfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh oldvozrhfy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" oldvozrhfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc oldvozrhfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs oldvozrhfy.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2848 WINWORD.EXE 2848 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1844 oldvozrhfy.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 1508 xuarwehvfabpiec.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3112 ufqkymchoxuwx.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 3116 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe 2464 fdskgpoz.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE 2848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1844 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 85 PID 3012 wrote to memory of 1844 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 85 PID 3012 wrote to memory of 1844 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 85 PID 3012 wrote to memory of 1508 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 86 PID 3012 wrote to memory of 1508 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 86 PID 3012 wrote to memory of 1508 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 86 PID 3012 wrote to memory of 3116 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 87 PID 3012 wrote to memory of 3116 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 87 PID 3012 wrote to memory of 3116 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 87 PID 3012 wrote to memory of 3112 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 88 PID 3012 wrote to memory of 3112 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 88 PID 3012 wrote to memory of 3112 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 88 PID 3012 wrote to memory of 2848 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 89 PID 3012 wrote to memory of 2848 3012 49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe 89 PID 1844 wrote to memory of 2464 1844 oldvozrhfy.exe 91 PID 1844 wrote to memory of 2464 1844 oldvozrhfy.exe 91 PID 1844 wrote to memory of 2464 1844 oldvozrhfy.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49b906b73640866936f17c7b6b9dd88b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\oldvozrhfy.exeoldvozrhfy.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\fdskgpoz.exeC:\Windows\system32\fdskgpoz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2464
-
-
-
C:\Windows\SysWOW64\xuarwehvfabpiec.exexuarwehvfabpiec.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508
-
-
C:\Windows\SysWOW64\fdskgpoz.exefdskgpoz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3116
-
-
C:\Windows\SysWOW64\ufqkymchoxuwx.exeufqkymchoxuwx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3112
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5651b18b03a97ebe2b168323eb4fa6841
SHA1abd714210e12fc23cb17f791a33065beab55673e
SHA2563f187abdd44f46a035bb0134b417bae07e4e06f7dd222ca28323f052a5c560d1
SHA512e1dbfbf296eb0b4f8eb405f996ba6d237046fd5b56ce46bbde91561cfc538f67c3889ae049a83c99aa0a67b790422fded19db703d9a497b0cc180be4b20bfeed
-
Filesize
512KB
MD53d3d67ddd952e65e2ebb15b0f72dbdb5
SHA14f1bc904350b5693fc4fffabae4fbe6b69e6c578
SHA256a20eef82facc1fa32cac7e68b1349847347312654d6f9315ed7e4393eddeda51
SHA512190b9c895f28780eddbf2ad8c85b58a010a5d4b917505f99022d8fde688398695c3cda51cfac1c7f224089696c360bc3011dcd94f2163408edd632cae1efdc7e
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59c0c0f59f14a3331bb5587e38552a942
SHA128933573a3d4754da496b06e51e24c6e634f955a
SHA256e08ec61807e88cc7f45df5266aaf7a2f79ad045c2fa673921b58a24e3b45c815
SHA512e2c27136cac777dea1503e48990900a224688b8a9191c9e56f42e2ca1a686edab952aaf26c1c2fd93cf7bac9b6d07dcad8737fa2bb2d8a039891a7629e3eba1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD55e92fc3b8af01d0864b68f422a932df1
SHA18c7006b7bffcb4929da0d527adfe08822dfc7096
SHA256fc9a7ad01632eacb9eeb67d1ef83de6b01776d037b9231c2d5201f0cd9f6865a
SHA512c9bf08c964ca6c390571b0cd50c56c2ce3dc4a24cb43c9bd96927847a5f6ffd6bfb9d1404d0d274529561922e55bf77e1a78c583ae06d6855949416a1ddd2423
-
Filesize
512KB
MD5ceae264286d5b9708b66cc105d480cb9
SHA1a630f9b4afb766dc59a83a0bb0582014a897cea5
SHA256d58feb989cb7468122dcb259d954c769e820b932f82a186db18150df65174255
SHA512b37603b0df19952fcf4adb07d1ebce641d20c359740dffff6a261d1a7d6f0e884b6ec27aee4c1a4fbda584a5d7ac72a0c18f3113711bba2bce6b031a584c85a6
-
Filesize
512KB
MD5e8b9cd5d10eefb1d7c0515668da82cac
SHA15868e620056daea6f0857f630c789744d342eab6
SHA256655fa8b6e22dc5ca4f7f610e94fa360d69cc685ec9843d45c161ad8c0fb48b58
SHA5120056d420234040884c73abed9630227afd41d02604e8c1ba8d542c57eba6b16f9430c5e234363ad0cb304f1e77b48dc0d462c57885cc5fbae686ab8c369db351
-
Filesize
512KB
MD582c2ac6dbe0a15d8845742620d68602e
SHA18aeb2ed29cbf7469fd90abfd49a9ee9a6e404ee8
SHA256c7f29410678a54b470e1a16aca20f86efaca2625e8bc1d271ef8a1519884ff2c
SHA51230a70f883ae84cabc8229b6ade6e994d9d063995679205489df3f41cc44dc1b25828a5b068e6759427a31e6e42d0aa66c65a9eac62313cb0538cdeed18b90a3d
-
Filesize
512KB
MD5a81e9875cb1375e8e44a7e0a9cb2ba60
SHA146bf88d889035360e17cf84f4746d41176d45a0d
SHA256ad490f1418ecc6726e6fbb2493468465515ce2a5cda62566a09ded1e6cf435d0
SHA51221649c9f8b4d8abdf925b6cf70c727da9fed9b524f1ed6b65122deab3eb184b2b2f1936c0d2b85885c45e0a8ae4e6932e8ad6708bcbd88ce64e12d5767ab5b19
-
Filesize
512KB
MD5768d14d144c1b913e8cff9c2797909f9
SHA1a9399caac9b3627caad8bf6b4c90af1b058a1b59
SHA25698830d27da3958842af01703736ac82d8c3e8340663c245d51f796c55b7142d5
SHA51253113e400df5ba7ae5bb2ba988bb948e004c0887940379931420cc8093d11610684875c73e2e135f2d3b07b145d4a46f8efba088644cc764b06f46b614ab9611
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD53cf2f4c79641305513476a0546633a33
SHA1f4aa1a54502e74750c2a1127f3ab22024ee27513
SHA2560c8a15ef26876c3ed79fddaaeda906f2b86337d33bc1aebc53e29739a16032d3
SHA5128a89e56e0d41b6e2b95cd159610fc5597b9108badb71a462ad234be2833d1552a79e5da800ff82e72a193741250681f12a8b07107ac1bbc5a9e81f415ca04c10
-
Filesize
512KB
MD53fe7304f69e087be43477e89daa0f492
SHA19cf21813b8169fafb53d8f9acc5047bbcd107564
SHA2567119b3a1f8c0e4fa7dffbf5944b83604e5e2b113595a16cde9fbbbd71783a32d
SHA5121341a5b88be01de9853f1f0995bc13ac60b22b2291eaf7eda3f84fd995c31dae2063d38209031c0cc81961864a856231590daccbafea689d048fb6d732c80291
-
Filesize
512KB
MD5337d941cfe67e6377ce45d75c66bcc86
SHA121cb078ce09e597cd5ec5b36e2ad7fa19763df38
SHA256df4b3febb0bea7983f585ae4eed6a31be0c5687a4ed4f204764bdaa175f12c5a
SHA5120419704805c07d3c8fdde778a1ab93d63d0bd7e46696e0a57a2da9dea3ea8c2e67087bd6553c747d00c3855be90999597ade0c389609d3a66f7c06f8b88a6451