Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe
-
Size
512KB
-
MD5
6583fa1c4a931884ab20da67ff58c4a7
-
SHA1
60ce85ffddee5f77b3dcdbbeaa0a18c6b3382670
-
SHA256
530c3e01f8ca478e81a5f867322d9d8b35369bb1fe0f9e6953a95cb09adfff4a
-
SHA512
342c49ce337a0db2fca9b9c19b5d63d1ebd45ddfd74fa3f018771c9deeadb643351e40c80e3f29c18489aa85bcc36555ebd02013eb9624d914815762bba4663c
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6b:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
utblvgbtza.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" utblvgbtza.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
utblvgbtza.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" utblvgbtza.exe -
Processes:
utblvgbtza.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" utblvgbtza.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
utblvgbtza.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" utblvgbtza.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
utblvgbtza.exencoztvebqoaspha.exedjhiazeg.exexcoopbvwqwzxs.exedjhiazeg.exepid process 2032 utblvgbtza.exe 1408 ncoztvebqoaspha.exe 3464 djhiazeg.exe 1212 xcoopbvwqwzxs.exe 4476 djhiazeg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
utblvgbtza.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" utblvgbtza.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ncoztvebqoaspha.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "xcoopbvwqwzxs.exe" ncoztvebqoaspha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vfexvhkw = "utblvgbtza.exe" ncoztvebqoaspha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hynkmgsp = "ncoztvebqoaspha.exe" ncoztvebqoaspha.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
djhiazeg.exeutblvgbtza.exedjhiazeg.exedescription ioc process File opened (read-only) \??\x: djhiazeg.exe File opened (read-only) \??\m: utblvgbtza.exe File opened (read-only) \??\s: utblvgbtza.exe File opened (read-only) \??\v: utblvgbtza.exe File opened (read-only) \??\a: djhiazeg.exe File opened (read-only) \??\p: djhiazeg.exe File opened (read-only) \??\a: djhiazeg.exe File opened (read-only) \??\s: djhiazeg.exe File opened (read-only) \??\m: djhiazeg.exe File opened (read-only) \??\k: utblvgbtza.exe File opened (read-only) \??\k: djhiazeg.exe File opened (read-only) \??\l: djhiazeg.exe File opened (read-only) \??\w: djhiazeg.exe File opened (read-only) \??\u: djhiazeg.exe File opened (read-only) \??\r: djhiazeg.exe File opened (read-only) \??\l: djhiazeg.exe File opened (read-only) \??\y: utblvgbtza.exe File opened (read-only) \??\z: utblvgbtza.exe File opened (read-only) \??\i: djhiazeg.exe File opened (read-only) \??\t: djhiazeg.exe File opened (read-only) \??\o: djhiazeg.exe File opened (read-only) \??\e: djhiazeg.exe File opened (read-only) \??\w: djhiazeg.exe File opened (read-only) \??\e: djhiazeg.exe File opened (read-only) \??\h: djhiazeg.exe File opened (read-only) \??\j: djhiazeg.exe File opened (read-only) \??\p: djhiazeg.exe File opened (read-only) \??\g: utblvgbtza.exe File opened (read-only) \??\h: utblvgbtza.exe File opened (read-only) \??\u: utblvgbtza.exe File opened (read-only) \??\o: djhiazeg.exe File opened (read-only) \??\g: djhiazeg.exe File opened (read-only) \??\w: utblvgbtza.exe File opened (read-only) \??\n: djhiazeg.exe File opened (read-only) \??\p: utblvgbtza.exe File opened (read-only) \??\z: djhiazeg.exe File opened (read-only) \??\j: djhiazeg.exe File opened (read-only) \??\t: djhiazeg.exe File opened (read-only) \??\r: djhiazeg.exe File opened (read-only) \??\m: djhiazeg.exe File opened (read-only) \??\a: utblvgbtza.exe File opened (read-only) \??\e: utblvgbtza.exe File opened (read-only) \??\i: utblvgbtza.exe File opened (read-only) \??\b: djhiazeg.exe File opened (read-only) \??\b: utblvgbtza.exe File opened (read-only) \??\l: utblvgbtza.exe File opened (read-only) \??\o: utblvgbtza.exe File opened (read-only) \??\q: utblvgbtza.exe File opened (read-only) \??\v: djhiazeg.exe File opened (read-only) \??\x: djhiazeg.exe File opened (read-only) \??\i: djhiazeg.exe File opened (read-only) \??\y: djhiazeg.exe File opened (read-only) \??\j: utblvgbtza.exe File opened (read-only) \??\n: djhiazeg.exe File opened (read-only) \??\b: djhiazeg.exe File opened (read-only) \??\u: djhiazeg.exe File opened (read-only) \??\t: utblvgbtza.exe File opened (read-only) \??\s: djhiazeg.exe File opened (read-only) \??\v: djhiazeg.exe File opened (read-only) \??\r: utblvgbtza.exe File opened (read-only) \??\x: utblvgbtza.exe File opened (read-only) \??\h: djhiazeg.exe File opened (read-only) \??\y: djhiazeg.exe File opened (read-only) \??\q: djhiazeg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
utblvgbtza.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" utblvgbtza.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" utblvgbtza.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3480-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ncoztvebqoaspha.exe autoit_exe C:\Windows\SysWOW64\utblvgbtza.exe autoit_exe C:\Windows\SysWOW64\djhiazeg.exe autoit_exe C:\Windows\SysWOW64\xcoopbvwqwzxs.exe autoit_exe \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Users\Admin\AppData\Roaming\DenyInitialize.doc.exe autoit_exe C:\Users\Admin\AppData\Roaming\ReceiveCompare.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exedjhiazeg.exeutblvgbtza.exedjhiazeg.exedescription ioc process File created C:\Windows\SysWOW64\djhiazeg.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File created C:\Windows\SysWOW64\xcoopbvwqwzxs.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe djhiazeg.exe File created C:\Windows\SysWOW64\utblvgbtza.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File created C:\Windows\SysWOW64\ncoztvebqoaspha.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll utblvgbtza.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification C:\Windows\SysWOW64\utblvgbtza.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ncoztvebqoaspha.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\djhiazeg.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification C:\Windows\SysWOW64\xcoopbvwqwzxs.exe 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
Processes:
djhiazeg.exedjhiazeg.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe djhiazeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe djhiazeg.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe djhiazeg.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe djhiazeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe djhiazeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal djhiazeg.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe djhiazeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe djhiazeg.exe -
Drops file in Windows directory 19 IoCs
Processes:
djhiazeg.exedjhiazeg.exeWINWORD.EXE6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe djhiazeg.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification C:\Windows\mydoc.rtf 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe djhiazeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe djhiazeg.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exeutblvgbtza.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32462D7C9C5283536D4376D770242DDA7C8464D8" 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat utblvgbtza.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh utblvgbtza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" utblvgbtza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" utblvgbtza.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg utblvgbtza.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBFACEF962F29384743A47869E3993B38E02FB4369023AE2CE42E808D2" 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf utblvgbtza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" utblvgbtza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB0B12047E639EB53CFB9A732E9D7BE" 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FFFF482F851E9047D75A7E93BC95E633584066366236D6EE" 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F76BB3FE1822D0D109D0A68A0B9014" 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1848C77815ECDAB0B8C97CE3ECE437C9" 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc utblvgbtza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" utblvgbtza.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" utblvgbtza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" utblvgbtza.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs utblvgbtza.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2728 WINWORD.EXE 2728 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exeutblvgbtza.exencoztvebqoaspha.exedjhiazeg.exexcoopbvwqwzxs.exedjhiazeg.exepid process 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 3464 djhiazeg.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 3464 djhiazeg.exe 3464 djhiazeg.exe 3464 djhiazeg.exe 3464 djhiazeg.exe 3464 djhiazeg.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1212 xcoopbvwqwzxs.exe 1408 ncoztvebqoaspha.exe 1408 ncoztvebqoaspha.exe 4476 djhiazeg.exe 4476 djhiazeg.exe 4476 djhiazeg.exe 4476 djhiazeg.exe 4476 djhiazeg.exe 4476 djhiazeg.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exeutblvgbtza.exedjhiazeg.exencoztvebqoaspha.exexcoopbvwqwzxs.exedjhiazeg.exepid process 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 4476 djhiazeg.exe 4476 djhiazeg.exe 4476 djhiazeg.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exeutblvgbtza.exedjhiazeg.exencoztvebqoaspha.exexcoopbvwqwzxs.exedjhiazeg.exepid process 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 2032 utblvgbtza.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 3464 djhiazeg.exe 1408 ncoztvebqoaspha.exe 1212 xcoopbvwqwzxs.exe 4476 djhiazeg.exe 4476 djhiazeg.exe 4476 djhiazeg.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE 2728 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exeutblvgbtza.exedescription pid process target process PID 3480 wrote to memory of 2032 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe utblvgbtza.exe PID 3480 wrote to memory of 2032 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe utblvgbtza.exe PID 3480 wrote to memory of 2032 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe utblvgbtza.exe PID 3480 wrote to memory of 1408 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe ncoztvebqoaspha.exe PID 3480 wrote to memory of 1408 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe ncoztvebqoaspha.exe PID 3480 wrote to memory of 1408 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe ncoztvebqoaspha.exe PID 3480 wrote to memory of 3464 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe djhiazeg.exe PID 3480 wrote to memory of 3464 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe djhiazeg.exe PID 3480 wrote to memory of 3464 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe djhiazeg.exe PID 3480 wrote to memory of 1212 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe xcoopbvwqwzxs.exe PID 3480 wrote to memory of 1212 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe xcoopbvwqwzxs.exe PID 3480 wrote to memory of 1212 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe xcoopbvwqwzxs.exe PID 3480 wrote to memory of 2728 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe WINWORD.EXE PID 3480 wrote to memory of 2728 3480 6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe WINWORD.EXE PID 2032 wrote to memory of 4476 2032 utblvgbtza.exe djhiazeg.exe PID 2032 wrote to memory of 4476 2032 utblvgbtza.exe djhiazeg.exe PID 2032 wrote to memory of 4476 2032 utblvgbtza.exe djhiazeg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6583fa1c4a931884ab20da67ff58c4a7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\utblvgbtza.exeutblvgbtza.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\djhiazeg.exeC:\Windows\system32\djhiazeg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4476 -
C:\Windows\SysWOW64\ncoztvebqoaspha.exencoztvebqoaspha.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1408 -
C:\Windows\SysWOW64\djhiazeg.exedjhiazeg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3464 -
C:\Windows\SysWOW64\xcoopbvwqwzxs.exexcoopbvwqwzxs.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1212 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5dd4aab7bb08fc96f9573e0286c1b31e9
SHA15919e5e531ff84e57b85602acd33239737cf836a
SHA25677e5229c277e25ccf9659ad9eb4aa401f4d54fbc9666369e09be90cb3cc83910
SHA512d423da4a459ead0cb5be00085e2bef5dc5a74ba3cf23cb204b57addc25df55b951b454a717ee7dcb89c34e4c829996b537ebf5b069d81d861a63280b0ede1305
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
512KB
MD5d31a2abedff3bcf657d3161ff88dc70b
SHA1800f7607b9ecaecbfdceb14b3438b99417b1240b
SHA256bad72e754dab5852e3f726ff4cf3be533c0006a344b24e674038af489f3d917c
SHA5120f2a36a9b4680ab42f3f4821a11c48112e82039fcd42cd65f9641056ab7ab881ae4d7716f3cfe2322ff3bd7f7c4ab83aff3b107f7c2335ff50217b7fe6e79d28
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5d5987e0cc2b319da0d8fd4d9e6dca949
SHA182b7177003e49dd37d1e9a1fecf76f86a5ad0f9e
SHA2560e3c63ec1c167f88dd105a5788a5dcdb570bf3dafe0354d3f7462fb681fbc3ad
SHA512c0823ea953068ab4ca90519ccce194fe7dcbee1f7f9795ed6596f0c3cd139ecf352c3926022ea1a6253b6572b5173874c59b731540081684fe78501a233d0be6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57ba9e2cbbecee50e2c5ccfff3f4da2b6
SHA1bdf1aeb2c78f78d2a7d415047f456775a8dedcb7
SHA2565d55eccde22d6c6b9ab277e38bdb2f7b9e5e9f43f12b77dcaea77b516602797c
SHA5121a13c59ce45c332e56f0fc4cda6e646bcc8b25b6ce967708a21c64477bd2a99583f959207848addd088cccc4fc1219949d648748f78e661b0393b7d0d31225f5
-
Filesize
512KB
MD5a6327fcee7501f6bf232c249c3eb3a69
SHA135191f0ffe31b998735499a4e4378c38956f2e0c
SHA25629e4cb4f97a9a6733fdfad485e2224adb4af975055bbda1b7cd47f0b53df85d5
SHA512b8d08214277f57f399f693c8ec6da64b52fd0bf73ba6be8ecd85592d37cc36b3a15017250b1ffeaf1f9c2cda0fed33e748c88930162e3763ff36afe72952f51b
-
Filesize
512KB
MD50d89480d8fe8cae5e65703ab663a715b
SHA10374bfd6e094356f1938c5bb16d914af63b80a10
SHA25684100add6c7a7565966ddb022d089185fae72c49e2a5292416f730d592a8c8de
SHA512325d542400ca91a99ca75eec3caffa4b2a1e65a66e248d17a077502b27c43073ebf6609caf056aaf1f08421f262465e24fdc957cf0fe2caddf44be0b05aac980
-
Filesize
512KB
MD5cc550d6f8b65a7c215d9d1f6d577f181
SHA1d887f67b597162827ec1fb90ae0ef9512ec4a7bd
SHA2561000338585e6dbf0350693805bc89e47502500f9dc49daacbac44177ccbf7739
SHA5129f82d9591491373bea45ab4b385d7360ce32575159fe883cd8619730a5317abb0429527886714c689deec838628920ed12abf30e9bb18a20c575cdbcb731dd83
-
Filesize
512KB
MD5c838596925f4c9e287ccb70c1be386fe
SHA1feaefb664abf986390c281ce632f383b11f24cb0
SHA2561046c005e4340a1355e22f20ad9c9a6ce2840abd47764611b9161b96b84cb5a0
SHA512484e5c652dfdb583cadc86e13879d84496f9bbb981949cc315b5009d4beacb20d4670353dff94ee6fc606f19ec834d856a4ddd99d3ca697e171c11ae2a90c038
-
Filesize
512KB
MD56a10f8f71ee2ffcbbac92a093f8bdb2a
SHA1656d310d43c15fed50c326319e2b43ce88b94edd
SHA256984e87c60f64439f8d25f7701f089b4a6a9463f0620df7064d1449acb0446a31
SHA51233c22626fece0ff1188b32beefac62f702f5394e217069930a84309fe47b4eedbb30d66fecc4edffd1be8a5702890d2121d719b97fd1c58fb4eafba1c36497d1
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD52bf5984d6cb2c8410673c8ac7d8e205d
SHA1b48ff0812198c9b91492d862691ed668ddc641d9
SHA25662faa274a7bd1a6c6016742f4a0cccc845dcfa6e07d665656abd583c5acfc5a6
SHA5121a5fc1c38633c03d1bcdb232d1001595ed4220082df30d39e62dd260d5d9c801e0859aad298f2bdec6931ecb6b2a42ae9bea9d0496c5ca61493cb93cbcbcb507
-
Filesize
512KB
MD5625a6eeeffd6a99ae7f62646ded75b79
SHA103d8a20030b0cdbe5815b64f8f8f6be388d87e33
SHA2568675487b3bce68f2e9dbb798ad9a32e74c48dd92f3b2ba030937150644b7a70a
SHA512f7dabe2df95ad16ac191edf3ee7ecdad22904c5bd17398767ba2558f5cc83951d5195a6886bbc9358ad5d8004d1d917653e3552e297d05d25705a3183edaabe1
-
Filesize
512KB
MD5e2a0d936a90be9b183c8bc8f68798300
SHA16a2ff0dbb023b4fab70b59bf0c31fa837d8f389f
SHA2568b574377e96a13cca4ff999563dae7d06bb4142396e095bc09e30c19f0abdc3e
SHA5124eecc339acb5151aa0a89fe6b399b5eddb9b88a013d5a291a5cd42d0f37f73f6eded082fdff0e9378b3c8fbbb9e5ec8adb1be88bf845aca390743fba64d50c7f