Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe
-
Size
512KB
-
MD5
6598101b433c5557be6c2226a1df29af
-
SHA1
f359e8a5dff641ac74aab026947dc7f48e3cabdc
-
SHA256
02ac4db0e6c3150abdd27d71e7a5cd4ba3b2e75eeceb0bd9f6410616e1a44861
-
SHA512
83d6601059110c199fadd51b6cc44009fa1534fe35c2e5cdc7be88464ea0465fcd8c5faf24b3d7c9a5145d38bc140a585fc586ea70cb243a12ec63404b5ae337
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5c
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
qlsyxiotzi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qlsyxiotzi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
qlsyxiotzi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qlsyxiotzi.exe -
Processes:
qlsyxiotzi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qlsyxiotzi.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
qlsyxiotzi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qlsyxiotzi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
qlsyxiotzi.exebermdrspzozownp.exepyttwhti.exeshhlxcptvhuek.exepyttwhti.exepid process 4044 qlsyxiotzi.exe 4028 bermdrspzozownp.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 1368 pyttwhti.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
qlsyxiotzi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qlsyxiotzi.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
bermdrspzozownp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tpariles = "qlsyxiotzi.exe" bermdrspzozownp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gwatadcv = "bermdrspzozownp.exe" bermdrspzozownp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "shhlxcptvhuek.exe" bermdrspzozownp.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
pyttwhti.exepyttwhti.exeqlsyxiotzi.exedescription ioc process File opened (read-only) \??\b: pyttwhti.exe File opened (read-only) \??\o: pyttwhti.exe File opened (read-only) \??\x: pyttwhti.exe File opened (read-only) \??\r: qlsyxiotzi.exe File opened (read-only) \??\w: qlsyxiotzi.exe File opened (read-only) \??\x: qlsyxiotzi.exe File opened (read-only) \??\h: pyttwhti.exe File opened (read-only) \??\j: pyttwhti.exe File opened (read-only) \??\u: pyttwhti.exe File opened (read-only) \??\r: pyttwhti.exe File opened (read-only) \??\v: qlsyxiotzi.exe File opened (read-only) \??\q: qlsyxiotzi.exe File opened (read-only) \??\o: pyttwhti.exe File opened (read-only) \??\q: pyttwhti.exe File opened (read-only) \??\o: qlsyxiotzi.exe File opened (read-only) \??\a: pyttwhti.exe File opened (read-only) \??\j: pyttwhti.exe File opened (read-only) \??\s: pyttwhti.exe File opened (read-only) \??\y: pyttwhti.exe File opened (read-only) \??\u: qlsyxiotzi.exe File opened (read-only) \??\n: pyttwhti.exe File opened (read-only) \??\p: pyttwhti.exe File opened (read-only) \??\y: pyttwhti.exe File opened (read-only) \??\b: pyttwhti.exe File opened (read-only) \??\j: qlsyxiotzi.exe File opened (read-only) \??\w: pyttwhti.exe File opened (read-only) \??\z: pyttwhti.exe File opened (read-only) \??\k: pyttwhti.exe File opened (read-only) \??\s: pyttwhti.exe File opened (read-only) \??\e: pyttwhti.exe File opened (read-only) \??\g: pyttwhti.exe File opened (read-only) \??\t: pyttwhti.exe File opened (read-only) \??\h: qlsyxiotzi.exe File opened (read-only) \??\z: qlsyxiotzi.exe File opened (read-only) \??\z: pyttwhti.exe File opened (read-only) \??\s: qlsyxiotzi.exe File opened (read-only) \??\w: pyttwhti.exe File opened (read-only) \??\r: pyttwhti.exe File opened (read-only) \??\l: pyttwhti.exe File opened (read-only) \??\b: qlsyxiotzi.exe File opened (read-only) \??\a: pyttwhti.exe File opened (read-only) \??\g: pyttwhti.exe File opened (read-only) \??\v: pyttwhti.exe File opened (read-only) \??\v: pyttwhti.exe File opened (read-only) \??\a: qlsyxiotzi.exe File opened (read-only) \??\i: pyttwhti.exe File opened (read-only) \??\q: pyttwhti.exe File opened (read-only) \??\t: pyttwhti.exe File opened (read-only) \??\x: pyttwhti.exe File opened (read-only) \??\n: pyttwhti.exe File opened (read-only) \??\p: pyttwhti.exe File opened (read-only) \??\t: qlsyxiotzi.exe File opened (read-only) \??\k: pyttwhti.exe File opened (read-only) \??\e: pyttwhti.exe File opened (read-only) \??\m: qlsyxiotzi.exe File opened (read-only) \??\n: qlsyxiotzi.exe File opened (read-only) \??\p: qlsyxiotzi.exe File opened (read-only) \??\m: pyttwhti.exe File opened (read-only) \??\u: pyttwhti.exe File opened (read-only) \??\g: qlsyxiotzi.exe File opened (read-only) \??\k: qlsyxiotzi.exe File opened (read-only) \??\l: qlsyxiotzi.exe File opened (read-only) \??\i: pyttwhti.exe File opened (read-only) \??\e: qlsyxiotzi.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
qlsyxiotzi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" qlsyxiotzi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" qlsyxiotzi.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3320-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\bermdrspzozownp.exe autoit_exe C:\Windows\SysWOW64\qlsyxiotzi.exe autoit_exe C:\Windows\SysWOW64\pyttwhti.exe autoit_exe C:\Windows\SysWOW64\shhlxcptvhuek.exe autoit_exe \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exepyttwhti.exeqlsyxiotzi.exepyttwhti.exedescription ioc process File created C:\Windows\SysWOW64\bermdrspzozownp.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File created C:\Windows\SysWOW64\pyttwhti.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File created C:\Windows\SysWOW64\shhlxcptvhuek.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pyttwhti.exe File created C:\Windows\SysWOW64\qlsyxiotzi.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qlsyxiotzi.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bermdrspzozownp.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pyttwhti.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\shhlxcptvhuek.exe 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qlsyxiotzi.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe pyttwhti.exe -
Drops file in Program Files directory 15 IoCs
Processes:
pyttwhti.exepyttwhti.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pyttwhti.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pyttwhti.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pyttwhti.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pyttwhti.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pyttwhti.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pyttwhti.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pyttwhti.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pyttwhti.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pyttwhti.exe -
Drops file in Windows directory 19 IoCs
Processes:
pyttwhti.exepyttwhti.exeWINWORD.EXE6598101b433c5557be6c2226a1df29af_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe pyttwhti.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pyttwhti.exe File opened for modification C:\Windows\mydoc.rtf 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe pyttwhti.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe pyttwhti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
qlsyxiotzi.exe6598101b433c5557be6c2226a1df29af_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFF8F4828851D9030D75D7E95BC90E634593066426344D79F" 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACEFAB1FE16F19483743A4381983E91B3FC02FB42620349E2C942EE09D1" 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2ECBB0584495389F52C9BAA133EAD7CF" 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh qlsyxiotzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs qlsyxiotzi.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" qlsyxiotzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" qlsyxiotzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F568B5FE1C22DAD279D0A28A7C9010" 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183EC70F15E3DBBFB8BC7CE0EDE437CF" 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat qlsyxiotzi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32422C0F9D5182566D3476A070522DDA7C8464AB" 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3612 WINWORD.EXE 3612 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exebermdrspzozownp.exeqlsyxiotzi.exeshhlxcptvhuek.exepyttwhti.exepyttwhti.exepid process 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 4668 shhlxcptvhuek.exe 4668 shhlxcptvhuek.exe 4668 shhlxcptvhuek.exe 4668 shhlxcptvhuek.exe 4668 shhlxcptvhuek.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 1368 pyttwhti.exe 1368 pyttwhti.exe 1368 pyttwhti.exe 1368 pyttwhti.exe 1368 pyttwhti.exe 1368 pyttwhti.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exeqlsyxiotzi.exebermdrspzozownp.exepyttwhti.exeshhlxcptvhuek.exepyttwhti.exepid process 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 1368 pyttwhti.exe 1368 pyttwhti.exe 1368 pyttwhti.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exeqlsyxiotzi.exebermdrspzozownp.exepyttwhti.exeshhlxcptvhuek.exepyttwhti.exepid process 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4044 qlsyxiotzi.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 4028 bermdrspzozownp.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 2404 pyttwhti.exe 4668 shhlxcptvhuek.exe 1368 pyttwhti.exe 1368 pyttwhti.exe 1368 pyttwhti.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3612 WINWORD.EXE 3612 WINWORD.EXE 3612 WINWORD.EXE 3612 WINWORD.EXE 3612 WINWORD.EXE 3612 WINWORD.EXE 3612 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6598101b433c5557be6c2226a1df29af_JaffaCakes118.exeqlsyxiotzi.exedescription pid process target process PID 3320 wrote to memory of 4044 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe qlsyxiotzi.exe PID 3320 wrote to memory of 4044 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe qlsyxiotzi.exe PID 3320 wrote to memory of 4044 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe qlsyxiotzi.exe PID 3320 wrote to memory of 4028 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe bermdrspzozownp.exe PID 3320 wrote to memory of 4028 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe bermdrspzozownp.exe PID 3320 wrote to memory of 4028 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe bermdrspzozownp.exe PID 3320 wrote to memory of 2404 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe pyttwhti.exe PID 3320 wrote to memory of 2404 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe pyttwhti.exe PID 3320 wrote to memory of 2404 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe pyttwhti.exe PID 3320 wrote to memory of 4668 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe shhlxcptvhuek.exe PID 3320 wrote to memory of 4668 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe shhlxcptvhuek.exe PID 3320 wrote to memory of 4668 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe shhlxcptvhuek.exe PID 3320 wrote to memory of 3612 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe WINWORD.EXE PID 3320 wrote to memory of 3612 3320 6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe WINWORD.EXE PID 4044 wrote to memory of 1368 4044 qlsyxiotzi.exe pyttwhti.exe PID 4044 wrote to memory of 1368 4044 qlsyxiotzi.exe pyttwhti.exe PID 4044 wrote to memory of 1368 4044 qlsyxiotzi.exe pyttwhti.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6598101b433c5557be6c2226a1df29af_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\qlsyxiotzi.exeqlsyxiotzi.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\pyttwhti.exeC:\Windows\system32\pyttwhti.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1368 -
C:\Windows\SysWOW64\bermdrspzozownp.exebermdrspzozownp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4028 -
C:\Windows\SysWOW64\pyttwhti.exepyttwhti.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2404 -
C:\Windows\SysWOW64\shhlxcptvhuek.exeshhlxcptvhuek.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4668 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5f0bc3fa136692dd3c961ee5ff3a04657
SHA19229bb2af380fe0dc3521a0c5b4c26a54330dc4c
SHA2564c8ce8c8fff1fb345b7c7395ef61405bce6857b288a92df6d788d9594cc63307
SHA512d5035e4b5c0a711f6210d47458c281e1d83308b80cfca20803d17ac78995245a38053d4bba4e8616bbaadaae8682dd635a382589ca89408ddfd653b60784173e
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD5955cfba83c355f3f6ad29e889ef145f4
SHA1e0af6190ffa9db812ff91cd876ebe4e124cd0d7e
SHA256e7c59d033ba6a5ea308e7d7251d7a73b4446637dfe25e212a74b02f0f97879f0
SHA51252e3b919ff075b11fab36855bf9bcb5f3756c4602267ad61c8d46de20c8cf458b54bf638afe1c1b4b7503d6cc18ab32acd200d455144a2bef45fddd4b7d5a5fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5d1b11c3c24ca7e5fbd68b056bd958133
SHA1b6e84e158144e39ff41b95a3e540c41e59d70f33
SHA2560fcf938258754eaf80686efee8ac5ec7b9bf52d55e4ce9cdfbccb5483dd0e21c
SHA512c31f1fd8bb0c18ccb734c12469d6fe6255cf306156b3f6b11fc5e6ae1ec29925664c59cd8511358d5a592a723c98cdc795fec1a1a8ad7048e7ac2fe10c7d0d19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5d01ba50346befed5fdadc61318394636
SHA1ced11aa62230eceea1031edb5968487d2b5a8898
SHA2564c5e953808ae4b2132ef208a6fb870e454a651f9734cfd3985753769e3a6bd08
SHA5129a13b48a8e278e21a3576eba90cc3a5944c550db63301c688dc9c1c96c83ce867b3a5c44834728cbc4c8b38bfae61fa292ab948d4a0b94d1b46fc536fe32cc6f
-
Filesize
512KB
MD5a0f322c518910b8f707106656f5d8bdf
SHA1825548d3cc981b643eb03ad56832d38aeab20b21
SHA2565edddd3e18e62aa61a98f8a2813d4442c12cd090e8e7e9a994a9c41b8be7c52e
SHA512626a2d1b4679c8aa9379bb31835bc995c15975da149e9caa1b9ac5693f630ec95dd5b4a7e2a40840064289673060dcbf38f34a4a21d254eaa43c745ce11688ba
-
Filesize
512KB
MD5ab7997e49ffcd4bc6c583a54b83f0ca3
SHA1bded20601c36cf082fd9203b07b27e0a086a0f3e
SHA256d2c98c287bd14a7495e0306f23f1c3d0b17778edbc0011e0e56bac292faeaf96
SHA512af9edd1742242f9e0bbd1b07fe2b10f5a15d9028e54931ac89d14b35c00795c81cb5bcc02a31aa294eeef1ed7ae320ec426e8e6c64c8aafe26f079216e59a03a
-
Filesize
512KB
MD51e8647a2943d136fc761395d6ecd6ba2
SHA1952048a03a6ab3c90f11d6db2765f5ad65214e49
SHA2560d67b91277fcadd8a4306f617a74272e755d47f619c87c94a8b8879acdac197a
SHA5129d75ed7e47767a16cd0c40de8ada019c6e3ec8c83eb25282a6e5e5ec1e8c03ad3f787a23ee6432e758a2cd3538a3b4ea0396139f41b1e4e79b9cd708d12198a6
-
Filesize
512KB
MD55d1b439e57ad36d29bac3786636dd887
SHA18b4a8532b2d662dd17d32ee3a0573e3291a719e8
SHA2561b0701599b6ce6d56daa2de8801ec3f50c2d19fc38619e3d3e5a18e4dfc44b9c
SHA5120eaa23adba6d1397fbfdf11135ad97ff77f042351630e374cec93c218fc8f6a1cb7e2a040be3b01ccbe0de80523e112bd2a1927a7df00d3f45bf6f0fdfa0baf2
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD58f511adf98a59430f26ae655dd790ad6
SHA14ee2c0f5facb88c1f6494e3a18e8460d6ba85848
SHA2563a2d8cb263bf7e178cc8a2ff0949b6c252821d0e174e20b1c2e3d79dc30234da
SHA51235cbc4bc5f6ae36137add9554daeb48792c232d99081c09bd89d0af673893288bd27243f193130272081b484d0812e68f4af5e9b5a03504379d8dccfae7abb2a
-
Filesize
512KB
MD5c2cbd2fa1454ebea70817e0b292b5a58
SHA1edef55ce4c4555f654f96734a311e27573c0a4bd
SHA2568110a58ce09ef1066e7ad3a81a665b9568ce3fb81df7c4b30593e371642cdea7
SHA512dd2c9901f853a062a0dcfb3151f25bafcbbd40c3c94a1cbc4c9687dcd15df4b0099c90f23b306284c5138f904189a979c7a9d1c87ce87d22f0f79f1b1e4162bd
-
Filesize
512KB
MD56f53f2f8c5b98de7ccc0bebbb5fb66f6
SHA1c96126697b9af60b6157b6eac96f353a8d290e89
SHA2567d10bc0d9bc6ff7679fbd8b5e85fa280e6fb60ec74fae45684bdff3ec80307f0
SHA512131bbac5a6645f3fbd586c15fbcc8817de4ba2c1282e1ade741b975f7a396deff31c10df5ea9c780bd05c511de4d368df91ca5e7149f96e81a81fda24ffac9c7