Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe
-
Size
512KB
-
MD5
6405585073d575772c692e49cee4c8b5
-
SHA1
a8d5c751e70f66c8f5001b9c0a3448cd57d4722f
-
SHA256
8df563237a289c67d16a88c3af62b10138d661be55187f9b5d9c2c56dff17004
-
SHA512
6a6ecfef5efebcaac5416548a004fe5d92daa79789f7a5b74a502c51802915625b8be60fc33fe4b67bab140b7361db4d0b4684d144c2398fe92959b3f185ba8a
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
fnmfjpgusj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" fnmfjpgusj.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
fnmfjpgusj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fnmfjpgusj.exe -
Processes:
fnmfjpgusj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" fnmfjpgusj.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
fnmfjpgusj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fnmfjpgusj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
fnmfjpgusj.exenvtjerjlaxgxcay.exegsfxjlej.exeqztvsxuewlmyi.exegsfxjlej.exepid process 1076 fnmfjpgusj.exe 3496 nvtjerjlaxgxcay.exe 4340 gsfxjlej.exe 740 qztvsxuewlmyi.exe 1724 gsfxjlej.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
fnmfjpgusj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fnmfjpgusj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
nvtjerjlaxgxcay.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qakbvpic = "fnmfjpgusj.exe" nvtjerjlaxgxcay.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pxtncyas = "nvtjerjlaxgxcay.exe" nvtjerjlaxgxcay.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qztvsxuewlmyi.exe" nvtjerjlaxgxcay.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
fnmfjpgusj.exegsfxjlej.exegsfxjlej.exedescription ioc process File opened (read-only) \??\e: fnmfjpgusj.exe File opened (read-only) \??\q: fnmfjpgusj.exe File opened (read-only) \??\z: fnmfjpgusj.exe File opened (read-only) \??\p: gsfxjlej.exe File opened (read-only) \??\z: gsfxjlej.exe File opened (read-only) \??\n: gsfxjlej.exe File opened (read-only) \??\m: fnmfjpgusj.exe File opened (read-only) \??\o: fnmfjpgusj.exe File opened (read-only) \??\u: gsfxjlej.exe File opened (read-only) \??\s: gsfxjlej.exe File opened (read-only) \??\b: gsfxjlej.exe File opened (read-only) \??\i: gsfxjlej.exe File opened (read-only) \??\q: gsfxjlej.exe File opened (read-only) \??\y: gsfxjlej.exe File opened (read-only) \??\h: gsfxjlej.exe File opened (read-only) \??\m: gsfxjlej.exe File opened (read-only) \??\u: gsfxjlej.exe File opened (read-only) \??\g: gsfxjlej.exe File opened (read-only) \??\b: gsfxjlej.exe File opened (read-only) \??\t: gsfxjlej.exe File opened (read-only) \??\v: gsfxjlej.exe File opened (read-only) \??\p: gsfxjlej.exe File opened (read-only) \??\n: fnmfjpgusj.exe File opened (read-only) \??\t: fnmfjpgusj.exe File opened (read-only) \??\x: fnmfjpgusj.exe File opened (read-only) \??\m: gsfxjlej.exe File opened (read-only) \??\o: gsfxjlej.exe File opened (read-only) \??\r: gsfxjlej.exe File opened (read-only) \??\s: gsfxjlej.exe File opened (read-only) \??\v: gsfxjlej.exe File opened (read-only) \??\h: fnmfjpgusj.exe File opened (read-only) \??\l: fnmfjpgusj.exe File opened (read-only) \??\y: fnmfjpgusj.exe File opened (read-only) \??\e: gsfxjlej.exe File opened (read-only) \??\w: gsfxjlej.exe File opened (read-only) \??\a: gsfxjlej.exe File opened (read-only) \??\l: gsfxjlej.exe File opened (read-only) \??\o: gsfxjlej.exe File opened (read-only) \??\q: gsfxjlej.exe File opened (read-only) \??\r: gsfxjlej.exe File opened (read-only) \??\g: fnmfjpgusj.exe File opened (read-only) \??\r: fnmfjpgusj.exe File opened (read-only) \??\h: gsfxjlej.exe File opened (read-only) \??\k: gsfxjlej.exe File opened (read-only) \??\x: gsfxjlej.exe File opened (read-only) \??\p: fnmfjpgusj.exe File opened (read-only) \??\n: gsfxjlej.exe File opened (read-only) \??\b: fnmfjpgusj.exe File opened (read-only) \??\i: gsfxjlej.exe File opened (read-only) \??\j: gsfxjlej.exe File opened (read-only) \??\l: gsfxjlej.exe File opened (read-only) \??\g: gsfxjlej.exe File opened (read-only) \??\j: gsfxjlej.exe File opened (read-only) \??\w: fnmfjpgusj.exe File opened (read-only) \??\a: gsfxjlej.exe File opened (read-only) \??\e: gsfxjlej.exe File opened (read-only) \??\k: fnmfjpgusj.exe File opened (read-only) \??\s: fnmfjpgusj.exe File opened (read-only) \??\k: gsfxjlej.exe File opened (read-only) \??\x: gsfxjlej.exe File opened (read-only) \??\z: gsfxjlej.exe File opened (read-only) \??\j: fnmfjpgusj.exe File opened (read-only) \??\w: gsfxjlej.exe File opened (read-only) \??\i: fnmfjpgusj.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
fnmfjpgusj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" fnmfjpgusj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" fnmfjpgusj.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4356-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\nvtjerjlaxgxcay.exe autoit_exe C:\Windows\SysWOW64\fnmfjpgusj.exe autoit_exe C:\Windows\SysWOW64\gsfxjlej.exe autoit_exe C:\Windows\SysWOW64\qztvsxuewlmyi.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Users\Admin\Documents\CheckpointPush.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exefnmfjpgusj.exegsfxjlej.exegsfxjlej.exedescription ioc process File opened for modification C:\Windows\SysWOW64\fnmfjpgusj.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll fnmfjpgusj.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gsfxjlej.exe File created C:\Windows\SysWOW64\fnmfjpgusj.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nvtjerjlaxgxcay.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gsfxjlej.exe File created C:\Windows\SysWOW64\gsfxjlej.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gsfxjlej.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qztvsxuewlmyi.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gsfxjlej.exe File created C:\Windows\SysWOW64\nvtjerjlaxgxcay.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File created C:\Windows\SysWOW64\qztvsxuewlmyi.exe 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gsfxjlej.exe -
Drops file in Program Files directory 15 IoCs
Processes:
gsfxjlej.exegsfxjlej.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gsfxjlej.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gsfxjlej.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gsfxjlej.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gsfxjlej.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gsfxjlej.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gsfxjlej.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gsfxjlej.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gsfxjlej.exe -
Drops file in Windows directory 19 IoCs
Processes:
gsfxjlej.exegsfxjlej.exeWINWORD.EXE6405585073d575772c692e49cee4c8b5_JaffaCakes118.exedescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification C:\Windows\mydoc.rtf 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gsfxjlej.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gsfxjlej.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gsfxjlej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
fnmfjpgusj.exe6405585073d575772c692e49cee4c8b5_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193FC77914E6DAB5B8BE7F92ED9F37CA" 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat fnmfjpgusj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc fnmfjpgusj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs fnmfjpgusj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FC8D4F5F82689042D62F7E90BD93E635594B67336237D79D" 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F06BB4FE6F21DAD109D1D58A099110" 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBF9C9FE10F19383753A4386EA39E4B08E03FC43160248E1CD429A09A3" 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B029479338EA53C4BAA532E9D7CC" 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" fnmfjpgusj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" fnmfjpgusj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf fnmfjpgusj.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33452C769C2483596A3677D070212DDB7CF664AA" 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2016 WINWORD.EXE 2016 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exegsfxjlej.exefnmfjpgusj.exenvtjerjlaxgxcay.exeqztvsxuewlmyi.exegsfxjlej.exepid process 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 1076 fnmfjpgusj.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 1076 fnmfjpgusj.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exefnmfjpgusj.exegsfxjlej.exenvtjerjlaxgxcay.exeqztvsxuewlmyi.exegsfxjlej.exepid process 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exefnmfjpgusj.exegsfxjlej.exenvtjerjlaxgxcay.exeqztvsxuewlmyi.exegsfxjlej.exepid process 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 1076 fnmfjpgusj.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 4340 gsfxjlej.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 3496 nvtjerjlaxgxcay.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 740 qztvsxuewlmyi.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe 1724 gsfxjlej.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE 2016 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6405585073d575772c692e49cee4c8b5_JaffaCakes118.exefnmfjpgusj.exedescription pid process target process PID 4356 wrote to memory of 1076 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe fnmfjpgusj.exe PID 4356 wrote to memory of 1076 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe fnmfjpgusj.exe PID 4356 wrote to memory of 1076 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe fnmfjpgusj.exe PID 4356 wrote to memory of 3496 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe nvtjerjlaxgxcay.exe PID 4356 wrote to memory of 3496 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe nvtjerjlaxgxcay.exe PID 4356 wrote to memory of 3496 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe nvtjerjlaxgxcay.exe PID 4356 wrote to memory of 4340 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe gsfxjlej.exe PID 4356 wrote to memory of 4340 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe gsfxjlej.exe PID 4356 wrote to memory of 4340 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe gsfxjlej.exe PID 4356 wrote to memory of 740 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe qztvsxuewlmyi.exe PID 4356 wrote to memory of 740 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe qztvsxuewlmyi.exe PID 4356 wrote to memory of 740 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe qztvsxuewlmyi.exe PID 4356 wrote to memory of 2016 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe WINWORD.EXE PID 4356 wrote to memory of 2016 4356 6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe WINWORD.EXE PID 1076 wrote to memory of 1724 1076 fnmfjpgusj.exe gsfxjlej.exe PID 1076 wrote to memory of 1724 1076 fnmfjpgusj.exe gsfxjlej.exe PID 1076 wrote to memory of 1724 1076 fnmfjpgusj.exe gsfxjlej.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\fnmfjpgusj.exefnmfjpgusj.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\gsfxjlej.exeC:\Windows\system32\gsfxjlej.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1724 -
C:\Windows\SysWOW64\nvtjerjlaxgxcay.exenvtjerjlaxgxcay.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3496 -
C:\Windows\SysWOW64\gsfxjlej.exegsfxjlej.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4340 -
C:\Windows\SysWOW64\qztvsxuewlmyi.exeqztvsxuewlmyi.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:740 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2016
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5fa98802bc6e0839464f99b22318a3b7d
SHA1d7a1d16d22771db902b28c013269c3b5191e76cd
SHA25651e2d3470ad0d34c38d695e248c9d08cfcdebdf397f677a6d4d0ebc20a8c9258
SHA512f411062b56e14a7ff1edc535288c2e5cdb3626095dad4e05379e4632fea28ac782250e09bb4853cdd6f391e5185a2244ef2f3064919c51c36890403e2531bcfa
-
Filesize
512KB
MD59530d2e4926452423a8d6399cd82cab7
SHA1c95bfa1132a0cafdf929429fc3bbd88e2e7b7618
SHA25648b331f6a79d70047584017e8e747260c48ae631957662f33cbbb8bcfbfd7284
SHA512d8af7c60c0366134349db5295b90634260749abf799b685d23a87f92f1901172173267732ce6ed57d566e1effc3438d09005c208cb628b1ea4cdac403cf750f1
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851218[[fn=gb]].xsl
Filesize262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD525021d51d6432d97ab23b9e1f8445ba1
SHA1f0ff3f61fd89bb9921cd086fa30a3d95476ca2a6
SHA2564f1a77c2fca23d540d8c2494ec00736bcf09c9825f8fb5907b450804b15eaed6
SHA512267ef9899dcf5528ba795d62f3f90f0c176a5210d6d6ee7840a1007795dfa1cf6c3f7c8708f126fd9d6db6106f4cfc379878489d0b1e72ad399732b35452227e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5dfd0987c310ac10c6422800df9e0ff1e
SHA1e711ed0933c24a60e30d6dfa393f0acb4dbc57e1
SHA25660d96c5c02dd38cee03e5b5c76912e3e755fd420314256586eea16695cddf02a
SHA51236b9d0d3eaeddee979fa6836488ea054a846cea0f3d354a51c26b8221f9f8461e3875fa8892ec4c6098338ff196279084c7398ad5393805ea7609fa86f855865
-
Filesize
512KB
MD5118fdc0b97219b399b76b382e9f17cee
SHA1667f7f51f14bc384cc34ec4a84f6349fe4cc212d
SHA256794f5c09b3cac8b74b92421b4fa8b6e1bce8a7539eda45cc0606e8d80342735b
SHA5125689bfa4dd8455067598d70da1017db41d1fcbb4aaa9a26c4b252288f9549e49bf5f1ad474f01199251b748b14e20a64f894567eec6bae40a278b7613e759792
-
Filesize
512KB
MD5c565c5d25b7cd843070c73bf161adb71
SHA16c7c62b4c556977a04c61dc04611e620db95b8c4
SHA2568f3d6173826b52a7eeb2438fbaa6290aba5f5d0a73e29f275c3cb8da8ba74b05
SHA51223e4520111a3f8dab7b31ca0a87e239497cac25df5f8a268dbc5ca8c5a2bb4e75cbce794d5fe875525f90f7486a14130f0d4c3e0b550e53f46f2c621f9b652fa
-
Filesize
512KB
MD54ddae493a455cb0bc5b83e5238a496d3
SHA191c39e4c91861420890e7fcc3ea1963242cb4b87
SHA256d944adc925b020ceb2bbaa48209002d15403c54221e0ad1da231680ea0d9146b
SHA5125db20c40fdb0a3236d1e23c45c274ab57154628879460e66060bf38c28365b96fe197e48cdd5c5c300fa4bf68300df1609518f30956622625981d87e3545476f
-
Filesize
512KB
MD535718eec5288b8c50d9b90d1efaf3ed7
SHA183ec93a40980211fbf3dd5063e677470b9421e92
SHA256e48f182979b0d46d78117b29133e9c027da27995167bbf2e5e8d8d7dd3192925
SHA512c0dbe45342b998d058053b195de0606815c27126a3ffaeba53b0bb862f42e7de17dd57b3af31bed7256eaf208b497fcb4a41527d0e18ddaada3e480a4e888c5e
-
Filesize
512KB
MD5517ec4dcea4eef18cc03e92a4ccce6f5
SHA1a0eea5062fe10efc6ad1c82188fba69185088df0
SHA25630c948ede18ab958bb438dd860c878936ea92fcccfbb5f945375d6a7906903ae
SHA512c667ff3236c855e67faa55d0f0fd9c7c2fa3cdfe4fff87c2af9ce332785c7d52a062b833910163f581e43ba2a58a8d286d579ad43cb8faf7963e2a45193c436c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5d2fd2caa5cd5bc2d175f1321ceb8629b
SHA1d6f5f43479f1ce15a9a1735cc1320ac5f9a10ef4
SHA256824807ad984d3a67a1903e03d0abd8895ec00490c4ff37f7591ce547c89a8558
SHA5124a50d4641f2e0fe3e88e202ae6433e1b525b4b884fce1c70958379934196e7a3269bf042cf4184ddd9f9c4c8674b4da5ba33656c0c79480099b01583097087b1
-
Filesize
512KB
MD54f5b1a46929522f24b5e2a18b8951df5
SHA1618bf2b4ed4b2510dc895b9bdf18b2a400cc22eb
SHA256058aa3a016f20c3f0c5ed916bbec6438a89a8c6eecaa00f5f1620e4ffd3362be
SHA512c11e63282db6208154b8096de60239722c819b478a515793c5fb567e52287f30963038158ece992673021c85cb53f5e544dc67022ce9e0ca366a52dc44899b11