Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe
-
Size
512KB
-
MD5
65da43850cad5e51c3c51487c2437fd7
-
SHA1
098c8253fc287c870cee0f2009a106628def9570
-
SHA256
53dc2e3f581a0eface39638520f1b3d589dedb4be74bb7f9d0c388a524204e43
-
SHA512
ce7acc30e7ff1dc5db48d0dfdad189a648d07cbef4c7886357af45881fb6669d7eadd16ff831cd99dec4d07fc42482ecc99159928ed027d8650105998623a37a
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ohpfenuhqh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ohpfenuhqh.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ohpfenuhqh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ohpfenuhqh.exe -
Processes:
ohpfenuhqh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ohpfenuhqh.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ohpfenuhqh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ohpfenuhqh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
ohpfenuhqh.exeezxxyppnvuiaoaw.exekpnkbhua.execogvtmnwyaonf.exekpnkbhua.exepid process 4796 ohpfenuhqh.exe 4688 ezxxyppnvuiaoaw.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 4108 kpnkbhua.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ohpfenuhqh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ohpfenuhqh.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ezxxyppnvuiaoaw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cogvtmnwyaonf.exe" ezxxyppnvuiaoaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\urjvamqe = "ohpfenuhqh.exe" ezxxyppnvuiaoaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\czrdspey = "ezxxyppnvuiaoaw.exe" ezxxyppnvuiaoaw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kpnkbhua.exekpnkbhua.exeohpfenuhqh.exedescription ioc process File opened (read-only) \??\o: kpnkbhua.exe File opened (read-only) \??\s: kpnkbhua.exe File opened (read-only) \??\u: kpnkbhua.exe File opened (read-only) \??\b: kpnkbhua.exe File opened (read-only) \??\e: kpnkbhua.exe File opened (read-only) \??\w: ohpfenuhqh.exe File opened (read-only) \??\a: kpnkbhua.exe File opened (read-only) \??\p: kpnkbhua.exe File opened (read-only) \??\z: kpnkbhua.exe File opened (read-only) \??\z: ohpfenuhqh.exe File opened (read-only) \??\j: kpnkbhua.exe File opened (read-only) \??\s: kpnkbhua.exe File opened (read-only) \??\k: ohpfenuhqh.exe File opened (read-only) \??\u: kpnkbhua.exe File opened (read-only) \??\n: ohpfenuhqh.exe File opened (read-only) \??\r: ohpfenuhqh.exe File opened (read-only) \??\y: ohpfenuhqh.exe File opened (read-only) \??\g: kpnkbhua.exe File opened (read-only) \??\j: kpnkbhua.exe File opened (read-only) \??\a: ohpfenuhqh.exe File opened (read-only) \??\h: ohpfenuhqh.exe File opened (read-only) \??\v: ohpfenuhqh.exe File opened (read-only) \??\i: kpnkbhua.exe File opened (read-only) \??\p: kpnkbhua.exe File opened (read-only) \??\r: kpnkbhua.exe File opened (read-only) \??\x: kpnkbhua.exe File opened (read-only) \??\l: ohpfenuhqh.exe File opened (read-only) \??\l: kpnkbhua.exe File opened (read-only) \??\y: kpnkbhua.exe File opened (read-only) \??\i: kpnkbhua.exe File opened (read-only) \??\t: kpnkbhua.exe File opened (read-only) \??\w: kpnkbhua.exe File opened (read-only) \??\j: ohpfenuhqh.exe File opened (read-only) \??\u: ohpfenuhqh.exe File opened (read-only) \??\g: kpnkbhua.exe File opened (read-only) \??\h: kpnkbhua.exe File opened (read-only) \??\k: kpnkbhua.exe File opened (read-only) \??\q: kpnkbhua.exe File opened (read-only) \??\a: kpnkbhua.exe File opened (read-only) \??\q: kpnkbhua.exe File opened (read-only) \??\b: ohpfenuhqh.exe File opened (read-only) \??\p: ohpfenuhqh.exe File opened (read-only) \??\q: ohpfenuhqh.exe File opened (read-only) \??\s: ohpfenuhqh.exe File opened (read-only) \??\t: ohpfenuhqh.exe File opened (read-only) \??\b: kpnkbhua.exe File opened (read-only) \??\e: ohpfenuhqh.exe File opened (read-only) \??\e: kpnkbhua.exe File opened (read-only) \??\r: kpnkbhua.exe File opened (read-only) \??\w: kpnkbhua.exe File opened (read-only) \??\i: ohpfenuhqh.exe File opened (read-only) \??\m: ohpfenuhqh.exe File opened (read-only) \??\x: ohpfenuhqh.exe File opened (read-only) \??\m: kpnkbhua.exe File opened (read-only) \??\n: kpnkbhua.exe File opened (read-only) \??\x: kpnkbhua.exe File opened (read-only) \??\o: ohpfenuhqh.exe File opened (read-only) \??\v: kpnkbhua.exe File opened (read-only) \??\h: kpnkbhua.exe File opened (read-only) \??\m: kpnkbhua.exe File opened (read-only) \??\n: kpnkbhua.exe File opened (read-only) \??\o: kpnkbhua.exe File opened (read-only) \??\l: kpnkbhua.exe File opened (read-only) \??\t: kpnkbhua.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ohpfenuhqh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ohpfenuhqh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ohpfenuhqh.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ezxxyppnvuiaoaw.exe autoit_exe C:\Windows\SysWOW64\ohpfenuhqh.exe autoit_exe C:\Windows\SysWOW64\kpnkbhua.exe autoit_exe C:\Windows\SysWOW64\cogvtmnwyaonf.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exekpnkbhua.exeohpfenuhqh.exekpnkbhua.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ohpfenuhqh.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\kpnkbhua.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kpnkbhua.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification C:\Windows\SysWOW64\cogvtmnwyaonf.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ohpfenuhqh.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe kpnkbhua.exe File created C:\Windows\SysWOW64\ohpfenuhqh.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\ezxxyppnvuiaoaw.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ezxxyppnvuiaoaw.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created C:\Windows\SysWOW64\cogvtmnwyaonf.exe 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
Processes:
kpnkbhua.exekpnkbhua.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal kpnkbhua.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kpnkbhua.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kpnkbhua.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kpnkbhua.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal kpnkbhua.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kpnkbhua.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal kpnkbhua.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kpnkbhua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal kpnkbhua.exe -
Drops file in Windows directory 19 IoCs
Processes:
kpnkbhua.exekpnkbhua.exe65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exeWINWORD.EXEdescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe kpnkbhua.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification C:\Windows\mydoc.rtf 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe kpnkbhua.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe kpnkbhua.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe kpnkbhua.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe kpnkbhua.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe kpnkbhua.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe kpnkbhua.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe kpnkbhua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
ohpfenuhqh.exe65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFF9BEFE65F29184793A41819B39E6B38903F143610338E1B8429A09D4" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183AC77B14E0DABFB9BE7FE4EDE237B9" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ohpfenuhqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ohpfenuhqh.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC0B02A47E039E953CCBAA133E9D7BC" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFF8848278268903CD72A7DE2BC95E640594667316330D7E9" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33372C0B9D5083596A4276A577232CD67C8F64A8" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ohpfenuhqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F468B7FE6E22DED208D0A38B789116" 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ohpfenuhqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ohpfenuhqh.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 372 WINWORD.EXE 372 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exeohpfenuhqh.exeezxxyppnvuiaoaw.exekpnkbhua.execogvtmnwyaonf.exekpnkbhua.exepid process 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 224 cogvtmnwyaonf.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exeohpfenuhqh.exeezxxyppnvuiaoaw.exekpnkbhua.execogvtmnwyaonf.exekpnkbhua.exepid process 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exeohpfenuhqh.exeezxxyppnvuiaoaw.exekpnkbhua.execogvtmnwyaonf.exekpnkbhua.exepid process 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4796 ohpfenuhqh.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 4688 ezxxyppnvuiaoaw.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 684 kpnkbhua.exe 224 cogvtmnwyaonf.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe 4108 kpnkbhua.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 372 WINWORD.EXE 372 WINWORD.EXE 372 WINWORD.EXE 372 WINWORD.EXE 372 WINWORD.EXE 372 WINWORD.EXE 372 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exeohpfenuhqh.exedescription pid process target process PID 116 wrote to memory of 4796 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe ohpfenuhqh.exe PID 116 wrote to memory of 4796 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe ohpfenuhqh.exe PID 116 wrote to memory of 4796 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe ohpfenuhqh.exe PID 116 wrote to memory of 4688 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe ezxxyppnvuiaoaw.exe PID 116 wrote to memory of 4688 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe ezxxyppnvuiaoaw.exe PID 116 wrote to memory of 4688 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe ezxxyppnvuiaoaw.exe PID 116 wrote to memory of 684 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe kpnkbhua.exe PID 116 wrote to memory of 684 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe kpnkbhua.exe PID 116 wrote to memory of 684 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe kpnkbhua.exe PID 116 wrote to memory of 224 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe cogvtmnwyaonf.exe PID 116 wrote to memory of 224 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe cogvtmnwyaonf.exe PID 116 wrote to memory of 224 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe cogvtmnwyaonf.exe PID 116 wrote to memory of 372 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe WINWORD.EXE PID 116 wrote to memory of 372 116 65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe WINWORD.EXE PID 4796 wrote to memory of 4108 4796 ohpfenuhqh.exe kpnkbhua.exe PID 4796 wrote to memory of 4108 4796 ohpfenuhqh.exe kpnkbhua.exe PID 4796 wrote to memory of 4108 4796 ohpfenuhqh.exe kpnkbhua.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65da43850cad5e51c3c51487c2437fd7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\ohpfenuhqh.exeohpfenuhqh.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\kpnkbhua.exeC:\Windows\system32\kpnkbhua.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4108 -
C:\Windows\SysWOW64\ezxxyppnvuiaoaw.exeezxxyppnvuiaoaw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4688 -
C:\Windows\SysWOW64\kpnkbhua.exekpnkbhua.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:684 -
C:\Windows\SysWOW64\cogvtmnwyaonf.execogvtmnwyaonf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:224 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5b8f30c204df850241cab08df9ddbee13
SHA130a0cdb9302327800efea7b8cac0b610d344e187
SHA2561c81466697215c355cc41a3b919bc793f65dc0c27fa4d723cb7f8ca601a2c77c
SHA512422cacbb64bdf25cb94a67e08b2383cc4d5a37e5b8a70b21d44c197b0417537b70e86eb5c59d6d331fca7655b82ebaf2f4dd68b607a535f2c0e62dfc78d191bb
-
Filesize
512KB
MD5a537c3f45d6f339565c53d17463e6568
SHA1fd8d20e00329a76f6119a13f21ac554e00f30786
SHA2561cf9d871a5406bee7920aa85a4564d4778b16d6ca189e180dee40d2919707c69
SHA51251ff623e02ca917c7924d6f916e7d6cba05c280e59defc2c5feb32ed34e1c2de14220b7f543386c2dbc3c6525fd27046d6601de782d31f9d34f4fde2bf3e6cc5
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
239B
MD569ab36f887c9aebc03cf2b9924e9af1a
SHA1e89545bd4d84ee79b970724d81406111054e5ede
SHA2567f418960bedd2f787ddffced8647021d08a07fd59577d0f2d012035779122e62
SHA512dc8ae47740aa9109b9646d40500529aeda9c71421f5586f2d6c45a96cdf5a10dd7a4ae45193fbb58d6b3ef918d476af02f699111a1280ddd71cc1f65af38d653
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5ec1fc98658ef76c5f6ef22b4f35d9529
SHA169433347e366e08c9efc8ac8beeb8ca373ec445c
SHA256c203bfffefcc5801f842e9ce3c2566becb43be246d7891f546f0dce69f5e3f86
SHA5127e2d18de4128051745ee958a0f71e7af7f9a53b1fe471298615932819a9fe876a96277aa9727f9efb715a3bec42e31fc8358878ab7609ba3a710503dd99d3441
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5989d1e488b3f46e88b1ee2ac383db886
SHA1daa9f97b10185d1baf89af15e50612acbad599e9
SHA256dcb49ec4e0dfda0bf367fe211b23d76e0085ce8f741519c9f27703c413c96b37
SHA512b941f866090be54342da53d0590c6a7b4766b900cf8a5ebc97d0ab6fb83cd2e8e8db3a390603cc1e3f19372bba820254c7069c2f5d8be81fa701df27a9e30dab
-
Filesize
512KB
MD5f255f43f50fa5a73a59af9eed61f095a
SHA1231947d58fb834f7e3b2e506616b90897641e24a
SHA256e900610dcd1766a1a995176751ea92049e25150661821bd1af65ec189349e331
SHA51259462861a42e6c1fbf776fe2c91ecb01b53555258cb7e175036cc750326e7892d320344f7e4aaee265408f3557d4aec9ea176106a09bb07bcdec867ed3b70a52
-
Filesize
512KB
MD5762ce6a3513facb32925e37cec121d33
SHA195e2c11a71847e13790f1a6fa641fad811a1fb8a
SHA25611e4efc9b7baf0bb68c4ad6c49a597fc3ade305f377127bf0ee84a5dd4df25db
SHA51220275535f03b254eb22a17dfcef41529564b6ed47711f95badfeff0637734c5aeb9c63d9bf4040d7baa42b9cd015af0173f312761de31ecc2557b97d9e7db985
-
Filesize
512KB
MD51835fae57305ae35856b8d3f18af5682
SHA1aa927b6052178fabdacbcc716da07b4629b6d201
SHA25662df060064720d3b8099e62bef4aa690520335450d18a42fd52e97cc45a58387
SHA5129df677574312904a44484fb925fcd1abed6dfdb2c76e8fd8e155c6a19cfd4115d00a57428515f04b9ff1041e8157aac30e4325639a05d4d77b0a372bcf4255d4
-
Filesize
512KB
MD5916f261dbd6b3c3b64faa7ee6f86748b
SHA1c8f20b3a8d0632e6a5f4996edbef3ce4ea367d1c
SHA2561a9c96d3c39b9aea0dffde9d2eed909de0663eb56f230078a3708a9af845ffe9
SHA5123285921c89bbf8cea5b9cab8e4a99cd247b4ece5958eee1c677809cb5b065cf6221dba5b85b1e932216d427701a6aeeacee1040a0b5857018984a6a8cdf1b3d4
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5ff5948c717178e06d334c201c2d0fe26
SHA19ee35c9e079210eaba46cb8ef9b8fd2ed5c55e66
SHA2567175c1a3bfaf44d268149b19520d832d19264e5bfe9306d82f61e4ff948a7faf
SHA5123205090f8badf2a40a732ef98c4159310c9a31f59294b2ecd8fbfe45a494711128c8f2286262cfccf7711db44f1a164e3bbc5b9cf16422e1e891dc4957573466
-
Filesize
512KB
MD5ca15892639444740d6c0e1b67b54df04
SHA11a9888116c4e65ba93a4ae19e7d759976a91e9fd
SHA25625eb7b7fdc3207cfef1b716e3eed24e0542f1b2e08683db86d447cfbc7c9329e
SHA51242bccc38d61ea0d097ae18044b1564fdd18f87edba637a62f92e87feb78d7dddb30a77fddf738bb796869b5a5ffae1d3c5374abd98a613ab881db684d0a0e19f