Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe
-
Size
512KB
-
MD5
69194f0d2b23637f90dfaf2778a428b4
-
SHA1
920c979f1deabee50c62a13cacb202e01ec5d10b
-
SHA256
91fe3f3415ae5d4e2f490d0cfb51aeadb7c29f4364a625736e939b85e29baad3
-
SHA512
afe67b87011547ba2c94fb2c013d78c54b896ca0b8b4430584749a52b10a3fbcd4a102156abfdea2ea5cd4ea01b98bb8b98912fe012b45f50062552811678439
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6b:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5w
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
cbexesdycj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cbexesdycj.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
cbexesdycj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cbexesdycj.exe -
Processes:
cbexesdycj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" cbexesdycj.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
cbexesdycj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbexesdycj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
cbexesdycj.exeealnhumafpjyike.exeffnnridj.exejgcllwacyxgei.exeffnnridj.exepid process 4480 cbexesdycj.exe 368 ealnhumafpjyike.exe 1976 ffnnridj.exe 1048 jgcllwacyxgei.exe 316 ffnnridj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
cbexesdycj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cbexesdycj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ealnhumafpjyike.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kzmbflmn = "cbexesdycj.exe" ealnhumafpjyike.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oerxvmop = "ealnhumafpjyike.exe" ealnhumafpjyike.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jgcllwacyxgei.exe" ealnhumafpjyike.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cbexesdycj.exeffnnridj.exeffnnridj.exedescription ioc process File opened (read-only) \??\e: cbexesdycj.exe File opened (read-only) \??\a: ffnnridj.exe File opened (read-only) \??\i: ffnnridj.exe File opened (read-only) \??\k: ffnnridj.exe File opened (read-only) \??\m: ffnnridj.exe File opened (read-only) \??\v: ffnnridj.exe File opened (read-only) \??\h: ffnnridj.exe File opened (read-only) \??\r: ffnnridj.exe File opened (read-only) \??\i: cbexesdycj.exe File opened (read-only) \??\z: cbexesdycj.exe File opened (read-only) \??\u: ffnnridj.exe File opened (read-only) \??\h: cbexesdycj.exe File opened (read-only) \??\v: cbexesdycj.exe File opened (read-only) \??\o: ffnnridj.exe File opened (read-only) \??\r: ffnnridj.exe File opened (read-only) \??\n: cbexesdycj.exe File opened (read-only) \??\p: cbexesdycj.exe File opened (read-only) \??\g: ffnnridj.exe File opened (read-only) \??\y: ffnnridj.exe File opened (read-only) \??\l: ffnnridj.exe File opened (read-only) \??\m: ffnnridj.exe File opened (read-only) \??\r: cbexesdycj.exe File opened (read-only) \??\y: cbexesdycj.exe File opened (read-only) \??\g: ffnnridj.exe File opened (read-only) \??\n: ffnnridj.exe File opened (read-only) \??\s: cbexesdycj.exe File opened (read-only) \??\j: ffnnridj.exe File opened (read-only) \??\h: ffnnridj.exe File opened (read-only) \??\q: ffnnridj.exe File opened (read-only) \??\a: ffnnridj.exe File opened (read-only) \??\i: ffnnridj.exe File opened (read-only) \??\o: ffnnridj.exe File opened (read-only) \??\u: cbexesdycj.exe File opened (read-only) \??\w: ffnnridj.exe File opened (read-only) \??\g: cbexesdycj.exe File opened (read-only) \??\l: cbexesdycj.exe File opened (read-only) \??\q: cbexesdycj.exe File opened (read-only) \??\b: ffnnridj.exe File opened (read-only) \??\e: ffnnridj.exe File opened (read-only) \??\k: ffnnridj.exe File opened (read-only) \??\q: ffnnridj.exe File opened (read-only) \??\s: ffnnridj.exe File opened (read-only) \??\o: cbexesdycj.exe File opened (read-only) \??\w: cbexesdycj.exe File opened (read-only) \??\b: ffnnridj.exe File opened (read-only) \??\x: ffnnridj.exe File opened (read-only) \??\a: cbexesdycj.exe File opened (read-only) \??\j: cbexesdycj.exe File opened (read-only) \??\s: ffnnridj.exe File opened (read-only) \??\w: ffnnridj.exe File opened (read-only) \??\t: cbexesdycj.exe File opened (read-only) \??\l: ffnnridj.exe File opened (read-only) \??\p: ffnnridj.exe File opened (read-only) \??\j: ffnnridj.exe File opened (read-only) \??\u: ffnnridj.exe File opened (read-only) \??\x: ffnnridj.exe File opened (read-only) \??\b: cbexesdycj.exe File opened (read-only) \??\k: cbexesdycj.exe File opened (read-only) \??\z: ffnnridj.exe File opened (read-only) \??\z: ffnnridj.exe File opened (read-only) \??\x: cbexesdycj.exe File opened (read-only) \??\n: ffnnridj.exe File opened (read-only) \??\t: ffnnridj.exe File opened (read-only) \??\e: ffnnridj.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
cbexesdycj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" cbexesdycj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" cbexesdycj.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1872-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ealnhumafpjyike.exe autoit_exe C:\Windows\SysWOW64\cbexesdycj.exe autoit_exe C:\Windows\SysWOW64\ffnnridj.exe autoit_exe C:\Windows\SysWOW64\jgcllwacyxgei.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.execbexesdycj.exeffnnridj.exeffnnridj.exedescription ioc process File opened for modification C:\Windows\SysWOW64\cbexesdycj.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\ffnnridj.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ffnnridj.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\jgcllwacyxgei.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jgcllwacyxgei.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll cbexesdycj.exe File created C:\Windows\SysWOW64\cbexesdycj.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\ealnhumafpjyike.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ealnhumafpjyike.exe 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ffnnridj.exe -
Drops file in Program Files directory 14 IoCs
Processes:
ffnnridj.exeffnnridj.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ffnnridj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ffnnridj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ffnnridj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ffnnridj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ffnnridj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ffnnridj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ffnnridj.exe -
Drops file in Windows directory 19 IoCs
Processes:
ffnnridj.exe69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exeffnnridj.exeWINWORD.EXEdescription ioc process File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification C:\Windows\mydoc.rtf 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ffnnridj.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ffnnridj.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ffnnridj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.execbexesdycj.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33402C7A9C2C82576A4277D370222DD77DF664AA" 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFFFB485A851D9134D6207D94BDEEE640583067406344D79D" 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" cbexesdycj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B12C47E039EC52CCBAA232EAD7CC" 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC67414E0DBB3B9B97CE9ED9137C9" 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" cbexesdycj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFFACCF961F19783783A4486963990B089038D4362024BE1BE42EB08D6" 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78368C6FE6921DAD209D0A28A749164" 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" cbexesdycj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc cbexesdycj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" cbexesdycj.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4408 WINWORD.EXE 4408 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.execbexesdycj.exeealnhumafpjyike.exeffnnridj.exejgcllwacyxgei.exeffnnridj.exepid process 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.execbexesdycj.exeealnhumafpjyike.exeffnnridj.exejgcllwacyxgei.exeffnnridj.exepid process 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 368 ealnhumafpjyike.exe 1976 ffnnridj.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 1976 ffnnridj.exe 1048 jgcllwacyxgei.exe 1976 ffnnridj.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.execbexesdycj.exeealnhumafpjyike.exeffnnridj.exejgcllwacyxgei.exeffnnridj.exepid process 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 4480 cbexesdycj.exe 368 ealnhumafpjyike.exe 1976 ffnnridj.exe 368 ealnhumafpjyike.exe 368 ealnhumafpjyike.exe 1976 ffnnridj.exe 1976 ffnnridj.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 1048 jgcllwacyxgei.exe 316 ffnnridj.exe 316 ffnnridj.exe 316 ffnnridj.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4408 WINWORD.EXE 4408 WINWORD.EXE 4408 WINWORD.EXE 4408 WINWORD.EXE 4408 WINWORD.EXE 4408 WINWORD.EXE 4408 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.execbexesdycj.exedescription pid process target process PID 1872 wrote to memory of 4480 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe cbexesdycj.exe PID 1872 wrote to memory of 4480 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe cbexesdycj.exe PID 1872 wrote to memory of 4480 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe cbexesdycj.exe PID 1872 wrote to memory of 368 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe ealnhumafpjyike.exe PID 1872 wrote to memory of 368 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe ealnhumafpjyike.exe PID 1872 wrote to memory of 368 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe ealnhumafpjyike.exe PID 1872 wrote to memory of 1976 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe ffnnridj.exe PID 1872 wrote to memory of 1976 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe ffnnridj.exe PID 1872 wrote to memory of 1976 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe ffnnridj.exe PID 1872 wrote to memory of 1048 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe jgcllwacyxgei.exe PID 1872 wrote to memory of 1048 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe jgcllwacyxgei.exe PID 1872 wrote to memory of 1048 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe jgcllwacyxgei.exe PID 1872 wrote to memory of 4408 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe WINWORD.EXE PID 1872 wrote to memory of 4408 1872 69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe WINWORD.EXE PID 4480 wrote to memory of 316 4480 cbexesdycj.exe ffnnridj.exe PID 4480 wrote to memory of 316 4480 cbexesdycj.exe ffnnridj.exe PID 4480 wrote to memory of 316 4480 cbexesdycj.exe ffnnridj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69194f0d2b23637f90dfaf2778a428b4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cbexesdycj.execbexesdycj.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\ffnnridj.exeC:\Windows\system32\ffnnridj.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:316 -
C:\Windows\SysWOW64\ealnhumafpjyike.exeealnhumafpjyike.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:368 -
C:\Windows\SysWOW64\ffnnridj.exeffnnridj.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976 -
C:\Windows\SysWOW64\jgcllwacyxgei.exejgcllwacyxgei.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1048 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56bff2423e3a6ddb08f1c8e69f33717f2
SHA1cc97f1d3c204c46cc388743bc30050ecca34cbc7
SHA256930f3551d8ca457b07d71ebc9b5462e15166ba3e11027b5a359b85b28102c411
SHA512d1f674482bee9d7dc04f9db74413efd97fa10a2b2159534fb32105d891ffeeda2d64be8e3a54e8c1bd536171986cab5b18664d9b7d17b57f8a3fc3fa03e1c157
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD56e2bcc24bbb57969fc8a74b95a50cd19
SHA1aa0e72aa8108a2f53bda18598d2748847f947bf8
SHA2567e50e52c6ddb1bd6331c2db881a140010bfbdf0943279b29bc23e97eea7f0ab9
SHA5122d133c9f3073bb3801ee868acd9380ccd6b589b21369cb083be7913d43093d93ca520e6f5bc7368ec53cc659981733529c3dcd999192c4e3ed9246ea124e8d1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD548847f51d21aa80587b5d58a8d36ae1a
SHA1e971dd7f1216ce3147c8f60076be5276a4385891
SHA2563c08a0f8294bf0236db78856cf34fea0e4f07b7dca2ecbcf71a46bbe864af530
SHA512ca4d4f0e2d29ebdbc2a8223af83af941e8627757e394e67c0daeb0b927a5c46612ce65cc4491ee4494fb562c471e5f29cbcac8056fcddbaff21139317cbe0a71
-
Filesize
512KB
MD52f51b8e39343546c0b5e4d24a837abde
SHA16595844f25f2d8a9b77ad4c9e2d5b93e445a8a4e
SHA2569a949745660c9626a853dd6f7aa38b26ab83df58413729d7e40a8ada24b5202e
SHA512487af4a19e22214c1a13c10836555c036ca1bbfb48ad380460a5697ee8e0eaa8484f10c1a09a22dcd82773813e802e93382d92bd9b14c484ff658d5869f7fd65
-
Filesize
512KB
MD5e23a9d8de9f8c841051dcf91dd7a9f0c
SHA1f17265d0f1897b2008ef1f7f580f5d87a2f4e335
SHA2563e12abd689ed3a60ff7dd998f0f1eb36353f9abf494dcfb98223b5032940372c
SHA5129a16695aab1892462c1dc415c42b61b077827d962f53967a63ff41e227a5880c2f53391c7bd82a1af3ed32e7ab8c7b69f10c00ae5ee764462148d9fe17f8a16d
-
Filesize
512KB
MD53db1e20254c035909ed5bc23ca9fa4a3
SHA1f81c6e6048f5a598917676978e47f2f6cd910fcf
SHA256bf09f8d0c23b8dc032a068cb2ea2e1b14bb306f1c64dda16da274a2e83fc435a
SHA512d5482fb31a3bf255aa83d41bf0ecd080a1318c24da108c39a9afa64e0bc5a6347dfc2a29d73aee1fc93e737eda752994b5dc529b25383f3bc1ff422a098b6ca7
-
Filesize
512KB
MD5d477d7b2618fd0d79bd688f304d97cd2
SHA14fc2a6d63fc84d2b5f3013efbb723222de37771b
SHA25692fed029cd983a92680cef9ea70db9d56d75ed756f2765f0d4dc5a452edc2fbc
SHA51281b4a3895a800e800c229313910fa277cc6e6efa2b81b258de63216c0b14be9a42f2c348eee63b12c1ce6b00f66734879562d8ac9b8e1da75f74780b25b454c5
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD51b3756b2f0779caab89363374cd0a2fc
SHA1f7f29df94373b0e0231cc19df4064559ab555be2
SHA256e9686874122c5491b02adc25bdb44b86853fcba157b51559c43e7825e66ec460
SHA512f41b8c377367c42b1cd2a27c047e8ce895122a4cda37fd3cbe0c0648aa90122f1ba18cfdac5dcbb2ba7a5a149b9740b6e83d79381c6ef741b4c6b42927edfe64
-
Filesize
512KB
MD5ca7f089947cde47f044f3a8a1586df44
SHA103143e7de9a4a6bcda98c4a0e0c917eda9a1652f
SHA2568da9306758f6b00cbbc179ffd6e79138dd9e1ab6e96dbce57fade46f36ce0d1b
SHA51278dd50e5a21540570946aca140b4a6d587ad44fd2e21885df3e5d959f869868c7bb99d26e921667c82f79da9678bb88ca4901c504b7873c32dad95a221f356ba
-
Filesize
512KB
MD5270673ec1a0c0e060ad495669f45e8d9
SHA181d6e89e15623e653eac41ed8215d75b0a13fac4
SHA256d006f1cd2d43a15413564514b9a52e9d61c5de675b8e1ca3a9a84b65339da156
SHA5128fe2ac5aa49704d5f1315191f8b25ee4b14ccf218e9a49304ce2f6bb4af38d1b1e5b7d0867805abad53633f13b6adf78afaa5dc6ef0458909db9b42c393f47bc