Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 16:47

General

  • Target

    6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    6405585073d575772c692e49cee4c8b5

  • SHA1

    a8d5c751e70f66c8f5001b9c0a3448cd57d4722f

  • SHA256

    8df563237a289c67d16a88c3af62b10138d661be55187f9b5d9c2c56dff17004

  • SHA512

    6a6ecfef5efebcaac5416548a004fe5d92daa79789f7a5b74a502c51802915625b8be60fc33fe4b67bab140b7361db4d0b4684d144c2398fe92959b3f185ba8a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6405585073d575772c692e49cee4c8b5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Windows\SysWOW64\fnmfjpgusj.exe
      fnmfjpgusj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\gsfxjlej.exe
        C:\Windows\system32\gsfxjlej.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1724
    • C:\Windows\SysWOW64\nvtjerjlaxgxcay.exe
      nvtjerjlaxgxcay.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3496
    • C:\Windows\SysWOW64\gsfxjlej.exe
      gsfxjlej.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4340
    • C:\Windows\SysWOW64\qztvsxuewlmyi.exe
      qztvsxuewlmyi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:740
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    fa98802bc6e0839464f99b22318a3b7d

    SHA1

    d7a1d16d22771db902b28c013269c3b5191e76cd

    SHA256

    51e2d3470ad0d34c38d695e248c9d08cfcdebdf397f677a6d4d0ebc20a8c9258

    SHA512

    f411062b56e14a7ff1edc535288c2e5cdb3626095dad4e05379e4632fea28ac782250e09bb4853cdd6f391e5185a2244ef2f3064919c51c36890403e2531bcfa

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    9530d2e4926452423a8d6399cd82cab7

    SHA1

    c95bfa1132a0cafdf929429fc3bbd88e2e7b7618

    SHA256

    48b331f6a79d70047584017e8e747260c48ae631957662f33cbbb8bcfbfd7284

    SHA512

    d8af7c60c0366134349db5295b90634260749abf799b685d23a87f92f1901172173267732ce6ed57d566e1effc3438d09005c208cb628b1ea4cdac403cf750f1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851218[[fn=gb]].xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    25021d51d6432d97ab23b9e1f8445ba1

    SHA1

    f0ff3f61fd89bb9921cd086fa30a3d95476ca2a6

    SHA256

    4f1a77c2fca23d540d8c2494ec00736bcf09c9825f8fb5907b450804b15eaed6

    SHA512

    267ef9899dcf5528ba795d62f3f90f0c176a5210d6d6ee7840a1007795dfa1cf6c3f7c8708f126fd9d6db6106f4cfc379878489d0b1e72ad399732b35452227e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    dfd0987c310ac10c6422800df9e0ff1e

    SHA1

    e711ed0933c24a60e30d6dfa393f0acb4dbc57e1

    SHA256

    60d96c5c02dd38cee03e5b5c76912e3e755fd420314256586eea16695cddf02a

    SHA512

    36b9d0d3eaeddee979fa6836488ea054a846cea0f3d354a51c26b8221f9f8461e3875fa8892ec4c6098338ff196279084c7398ad5393805ea7609fa86f855865

  • C:\Users\Admin\Documents\CheckpointPush.doc.exe

    Filesize

    512KB

    MD5

    118fdc0b97219b399b76b382e9f17cee

    SHA1

    667f7f51f14bc384cc34ec4a84f6349fe4cc212d

    SHA256

    794f5c09b3cac8b74b92421b4fa8b6e1bce8a7539eda45cc0606e8d80342735b

    SHA512

    5689bfa4dd8455067598d70da1017db41d1fcbb4aaa9a26c4b252288f9549e49bf5f1ad474f01199251b748b14e20a64f894567eec6bae40a278b7613e759792

  • C:\Windows\SysWOW64\fnmfjpgusj.exe

    Filesize

    512KB

    MD5

    c565c5d25b7cd843070c73bf161adb71

    SHA1

    6c7c62b4c556977a04c61dc04611e620db95b8c4

    SHA256

    8f3d6173826b52a7eeb2438fbaa6290aba5f5d0a73e29f275c3cb8da8ba74b05

    SHA512

    23e4520111a3f8dab7b31ca0a87e239497cac25df5f8a268dbc5ca8c5a2bb4e75cbce794d5fe875525f90f7486a14130f0d4c3e0b550e53f46f2c621f9b652fa

  • C:\Windows\SysWOW64\gsfxjlej.exe

    Filesize

    512KB

    MD5

    4ddae493a455cb0bc5b83e5238a496d3

    SHA1

    91c39e4c91861420890e7fcc3ea1963242cb4b87

    SHA256

    d944adc925b020ceb2bbaa48209002d15403c54221e0ad1da231680ea0d9146b

    SHA512

    5db20c40fdb0a3236d1e23c45c274ab57154628879460e66060bf38c28365b96fe197e48cdd5c5c300fa4bf68300df1609518f30956622625981d87e3545476f

  • C:\Windows\SysWOW64\nvtjerjlaxgxcay.exe

    Filesize

    512KB

    MD5

    35718eec5288b8c50d9b90d1efaf3ed7

    SHA1

    83ec93a40980211fbf3dd5063e677470b9421e92

    SHA256

    e48f182979b0d46d78117b29133e9c027da27995167bbf2e5e8d8d7dd3192925

    SHA512

    c0dbe45342b998d058053b195de0606815c27126a3ffaeba53b0bb862f42e7de17dd57b3af31bed7256eaf208b497fcb4a41527d0e18ddaada3e480a4e888c5e

  • C:\Windows\SysWOW64\qztvsxuewlmyi.exe

    Filesize

    512KB

    MD5

    517ec4dcea4eef18cc03e92a4ccce6f5

    SHA1

    a0eea5062fe10efc6ad1c82188fba69185088df0

    SHA256

    30c948ede18ab958bb438dd860c878936ea92fcccfbb5f945375d6a7906903ae

    SHA512

    c667ff3236c855e67faa55d0f0fd9c7c2fa3cdfe4fff87c2af9ce332785c7d52a062b833910163f581e43ba2a58a8d286d579ad43cb8faf7963e2a45193c436c

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    d2fd2caa5cd5bc2d175f1321ceb8629b

    SHA1

    d6f5f43479f1ce15a9a1735cc1320ac5f9a10ef4

    SHA256

    824807ad984d3a67a1903e03d0abd8895ec00490c4ff37f7591ce547c89a8558

    SHA512

    4a50d4641f2e0fe3e88e202ae6433e1b525b4b884fce1c70958379934196e7a3269bf042cf4184ddd9f9c4c8674b4da5ba33656c0c79480099b01583097087b1

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    4f5b1a46929522f24b5e2a18b8951df5

    SHA1

    618bf2b4ed4b2510dc895b9bdf18b2a400cc22eb

    SHA256

    058aa3a016f20c3f0c5ed916bbec6438a89a8c6eecaa00f5f1620e4ffd3362be

    SHA512

    c11e63282db6208154b8096de60239722c819b478a515793c5fb567e52287f30963038158ece992673021c85cb53f5e544dc67022ce9e0ca366a52dc44899b11

  • memory/2016-39-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-38-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-36-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-37-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-35-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-40-0x00007FFA27CD0000-0x00007FFA27CE0000-memory.dmp

    Filesize

    64KB

  • memory/2016-41-0x00007FFA27CD0000-0x00007FFA27CE0000-memory.dmp

    Filesize

    64KB

  • memory/2016-608-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-609-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-610-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/2016-607-0x00007FFA2A430000-0x00007FFA2A440000-memory.dmp

    Filesize

    64KB

  • memory/4356-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB