Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe
-
Size
512KB
-
MD5
691a70fb48009ce8f2fc3a16294625a8
-
SHA1
a494cc28024bae48d076fc36ced18581bcd8cad0
-
SHA256
188e634d7fc937ca9f6defaa3c517d71f99acfd934e4423231a48b4e67f55e49
-
SHA512
210a61dc73cacb7c3c906a65bc1df8365a5e1c7f7660bbb72bb0f4abb3d40d4172d9abfcbb115d9ebb74bb820c66c065fd83eda4d98a0dd4206fb079f1c50026
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6R:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5q
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ausiikfpox.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ausiikfpox.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ausiikfpox.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ausiikfpox.exe -
Processes:
ausiikfpox.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ausiikfpox.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ausiikfpox.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ausiikfpox.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
ausiikfpox.exetxntkvynqroxhhd.exextmpqkxf.exeszayfmdresipy.exextmpqkxf.exepid process 4100 ausiikfpox.exe 536 txntkvynqroxhhd.exe 4800 xtmpqkxf.exe 4232 szayfmdresipy.exe 2576 xtmpqkxf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ausiikfpox.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ausiikfpox.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
txntkvynqroxhhd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cfdhsqcw = "ausiikfpox.exe" txntkvynqroxhhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hcofenwp = "txntkvynqroxhhd.exe" txntkvynqroxhhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "szayfmdresipy.exe" txntkvynqroxhhd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ausiikfpox.exextmpqkxf.exextmpqkxf.exedescription ioc process File opened (read-only) \??\q: ausiikfpox.exe File opened (read-only) \??\h: xtmpqkxf.exe File opened (read-only) \??\u: xtmpqkxf.exe File opened (read-only) \??\s: xtmpqkxf.exe File opened (read-only) \??\z: xtmpqkxf.exe File opened (read-only) \??\g: ausiikfpox.exe File opened (read-only) \??\w: ausiikfpox.exe File opened (read-only) \??\o: xtmpqkxf.exe File opened (read-only) \??\a: xtmpqkxf.exe File opened (read-only) \??\t: xtmpqkxf.exe File opened (read-only) \??\r: xtmpqkxf.exe File opened (read-only) \??\a: ausiikfpox.exe File opened (read-only) \??\l: ausiikfpox.exe File opened (read-only) \??\p: ausiikfpox.exe File opened (read-only) \??\x: xtmpqkxf.exe File opened (read-only) \??\h: xtmpqkxf.exe File opened (read-only) \??\l: xtmpqkxf.exe File opened (read-only) \??\j: ausiikfpox.exe File opened (read-only) \??\k: ausiikfpox.exe File opened (read-only) \??\k: xtmpqkxf.exe File opened (read-only) \??\y: ausiikfpox.exe File opened (read-only) \??\v: xtmpqkxf.exe File opened (read-only) \??\r: ausiikfpox.exe File opened (read-only) \??\i: xtmpqkxf.exe File opened (read-only) \??\q: xtmpqkxf.exe File opened (read-only) \??\r: xtmpqkxf.exe File opened (read-only) \??\g: xtmpqkxf.exe File opened (read-only) \??\n: xtmpqkxf.exe File opened (read-only) \??\o: xtmpqkxf.exe File opened (read-only) \??\u: xtmpqkxf.exe File opened (read-only) \??\u: ausiikfpox.exe File opened (read-only) \??\v: ausiikfpox.exe File opened (read-only) \??\l: xtmpqkxf.exe File opened (read-only) \??\j: xtmpqkxf.exe File opened (read-only) \??\k: xtmpqkxf.exe File opened (read-only) \??\m: xtmpqkxf.exe File opened (read-only) \??\t: xtmpqkxf.exe File opened (read-only) \??\o: ausiikfpox.exe File opened (read-only) \??\z: ausiikfpox.exe File opened (read-only) \??\a: xtmpqkxf.exe File opened (read-only) \??\e: xtmpqkxf.exe File opened (read-only) \??\j: xtmpqkxf.exe File opened (read-only) \??\y: xtmpqkxf.exe File opened (read-only) \??\s: ausiikfpox.exe File opened (read-only) \??\z: xtmpqkxf.exe File opened (read-only) \??\n: xtmpqkxf.exe File opened (read-only) \??\q: xtmpqkxf.exe File opened (read-only) \??\b: xtmpqkxf.exe File opened (read-only) \??\p: xtmpqkxf.exe File opened (read-only) \??\w: xtmpqkxf.exe File opened (read-only) \??\h: ausiikfpox.exe File opened (read-only) \??\i: ausiikfpox.exe File opened (read-only) \??\e: xtmpqkxf.exe File opened (read-only) \??\x: xtmpqkxf.exe File opened (read-only) \??\g: xtmpqkxf.exe File opened (read-only) \??\s: xtmpqkxf.exe File opened (read-only) \??\m: ausiikfpox.exe File opened (read-only) \??\n: ausiikfpox.exe File opened (read-only) \??\b: xtmpqkxf.exe File opened (read-only) \??\x: ausiikfpox.exe File opened (read-only) \??\m: xtmpqkxf.exe File opened (read-only) \??\w: xtmpqkxf.exe File opened (read-only) \??\b: ausiikfpox.exe File opened (read-only) \??\e: ausiikfpox.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ausiikfpox.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ausiikfpox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ausiikfpox.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2888-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\txntkvynqroxhhd.exe autoit_exe C:\Windows\SysWOW64\ausiikfpox.exe autoit_exe C:\Windows\SysWOW64\xtmpqkxf.exe autoit_exe C:\Windows\SysWOW64\szayfmdresipy.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exextmpqkxf.exeausiikfpox.exextmpqkxf.exedescription ioc process File opened for modification C:\Windows\SysWOW64\txntkvynqroxhhd.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xtmpqkxf.exe File created C:\Windows\SysWOW64\ausiikfpox.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File created C:\Windows\SysWOW64\txntkvynqroxhhd.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File created C:\Windows\SysWOW64\xtmpqkxf.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xtmpqkxf.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File created C:\Windows\SysWOW64\szayfmdresipy.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\szayfmdresipy.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ausiikfpox.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification C:\Windows\SysWOW64\ausiikfpox.exe 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xtmpqkxf.exe -
Drops file in Program Files directory 14 IoCs
Processes:
xtmpqkxf.exextmpqkxf.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xtmpqkxf.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xtmpqkxf.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xtmpqkxf.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xtmpqkxf.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xtmpqkxf.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xtmpqkxf.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xtmpqkxf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xtmpqkxf.exe -
Drops file in Windows directory 19 IoCs
Processes:
xtmpqkxf.exeWINWORD.EXExtmpqkxf.exe691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exedescription ioc process File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xtmpqkxf.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xtmpqkxf.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xtmpqkxf.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xtmpqkxf.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xtmpqkxf.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification C:\Windows\mydoc.rtf 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xtmpqkxf.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xtmpqkxf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exeausiikfpox.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F26BB3FE1B21D0D173D1D68A7A9014" 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1848C60B15EDDAC4B8C17C93ECE037C9" 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33422D7D9D5183566A3576A270202DDE7D8165A8" 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ausiikfpox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFC8D485882189145D72A7D91BCEFE1375844674E623ED69D" 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B02E47E338E252CFBAA0339DD7B9" 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ausiikfpox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ausiikfpox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ausiikfpox.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ausiikfpox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ausiikfpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8F9BCF963F2E2837B3A4781EB39E6B38E038F43670248E1BD42E808D5" 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1824 WINWORD.EXE 1824 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exeausiikfpox.exetxntkvynqroxhhd.exextmpqkxf.exeszayfmdresipy.exextmpqkxf.exepid process 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exeausiikfpox.exetxntkvynqroxhhd.exextmpqkxf.exeszayfmdresipy.exextmpqkxf.exepid process 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exeausiikfpox.exetxntkvynqroxhhd.exextmpqkxf.exeszayfmdresipy.exextmpqkxf.exepid process 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 4100 ausiikfpox.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 536 txntkvynqroxhhd.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4800 xtmpqkxf.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 4232 szayfmdresipy.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe 2576 xtmpqkxf.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1824 WINWORD.EXE 1824 WINWORD.EXE 1824 WINWORD.EXE 1824 WINWORD.EXE 1824 WINWORD.EXE 1824 WINWORD.EXE 1824 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exeausiikfpox.exedescription pid process target process PID 2888 wrote to memory of 4100 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe ausiikfpox.exe PID 2888 wrote to memory of 4100 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe ausiikfpox.exe PID 2888 wrote to memory of 4100 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe ausiikfpox.exe PID 2888 wrote to memory of 536 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe txntkvynqroxhhd.exe PID 2888 wrote to memory of 536 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe txntkvynqroxhhd.exe PID 2888 wrote to memory of 536 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe txntkvynqroxhhd.exe PID 2888 wrote to memory of 4800 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe xtmpqkxf.exe PID 2888 wrote to memory of 4800 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe xtmpqkxf.exe PID 2888 wrote to memory of 4800 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe xtmpqkxf.exe PID 2888 wrote to memory of 4232 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe szayfmdresipy.exe PID 2888 wrote to memory of 4232 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe szayfmdresipy.exe PID 2888 wrote to memory of 4232 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe szayfmdresipy.exe PID 2888 wrote to memory of 1824 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe WINWORD.EXE PID 2888 wrote to memory of 1824 2888 691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe WINWORD.EXE PID 4100 wrote to memory of 2576 4100 ausiikfpox.exe xtmpqkxf.exe PID 4100 wrote to memory of 2576 4100 ausiikfpox.exe xtmpqkxf.exe PID 4100 wrote to memory of 2576 4100 ausiikfpox.exe xtmpqkxf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\691a70fb48009ce8f2fc3a16294625a8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\ausiikfpox.exeausiikfpox.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\xtmpqkxf.exeC:\Windows\system32\xtmpqkxf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2576 -
C:\Windows\SysWOW64\txntkvynqroxhhd.exetxntkvynqroxhhd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:536 -
C:\Windows\SysWOW64\xtmpqkxf.exextmpqkxf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4800 -
C:\Windows\SysWOW64\szayfmdresipy.exeszayfmdresipy.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4232 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD58c14d4bfb79fe9171315f75a69834980
SHA1e10d3563e23cc3c72210a353dbf063bb9d86e96e
SHA25633a0088eace5b3ec814a504cb70b4c7993368d74b83a1c0bab784cdf912e82c1
SHA512b48725024a387b4762344c04ae88ca8e283ec2fff5e834520268b3b1d3e89a1fe1494512d657a38ebc8d9bcf41dcdd980b74277b54b7edca41aebc0dd03bc3ee
-
Filesize
512KB
MD5e71aa7ffdf0dc9f98ee2c2523d93a23f
SHA176d75c4c632ed31c3b2e50de197d76ab14ce9ec7
SHA256fd7901c4493c6e8e963e26d2ff841d31b810ab806cd39526d67995dd493a3ed9
SHA512c039f02793e934ff01be6cff84dc534a9be2b8b25cd230afc640fd3a4760e44fac563402557bac71bdfb0b1d5a759b4fdc5dc3316334f522b03ab99e78b9d1d4
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5eb17c1b2c8d3a323f6c979e979c802d2
SHA1a703e8e2ee81055c3cf4fba5e9fce0d70fef82d1
SHA2568e5d8b96042b9a1d946efad1ecfd9d616aafd936e8e0298efd3e20725f3c1193
SHA512858a8efe0cd44ba510f3430b9729f148bf498660ecebf5528d55138248d5788ff96650e292571da3f7fe1671979ae3787a4d75381537a39386bcd39bdfb7fc77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5f556bfb57d832de6ccfdcc53bc169400
SHA1be9301a93de1d67f579a07585e08c9a1bee9f9ca
SHA256e21dc49e1efaaec3dfa9f630ecadcb5142459eb24694e5aec5a2369c85333e6b
SHA512f05a29cc65472fc68c8e6876e357f7acdb46c6828a9239fe9b50856e54d788cb6f6815afbc876823c546856e4278b9ccf16f7a57ff896feb5fb62444bfc26ee6
-
Filesize
512KB
MD5ff23e4b056b663488196bdad02af76b1
SHA1dfec8397135a6783edffd054f48b37492cc8d754
SHA25689f4b6d66dc28b05049771324c3bdeb8219a63e4297dfe589ccc5940d9086fba
SHA5120d6387366fc6c4506df4a5c119a83e2228babe3009a201b6ebb46925527c8e8f6c4d1b3eee1fa50923186fff5c9aebb378277072a54977ef81d7dfc5443d024a
-
Filesize
512KB
MD53e706b018d89ca9c70d268b2db9b24f0
SHA14ea883458b002f0cfe8bc5c0c57ee77fa1e57b52
SHA25665b325659ccbb0c3c259a3d04eee1391524bd34d0f3619c489d42e0fad34d7cb
SHA5120ae7b33f9f258f229219f2b1be241b628eee303ff2157ccb6e94392ca8e83e0f72ed2e0bf52887e54536500a59ef5d68a6f3ef10ab92de977de4c31dd73ed915
-
Filesize
512KB
MD56b9da1e3d7fcd783dc73c741e3737ab5
SHA13ec9a1cfb462e1515f0ec80a8c935deb883eeb29
SHA256cb9996223de8d0e44ffe03a8109b3285609e93eac7cf7005f37124c6d31c84b9
SHA5120f85722ee95e2e644e863bb474193454a1ae5451ded5154bf2dc0b96d8f72bc6a8caa7234aba2ca27613cd20c4b9d6e3b6affe4f6c6faf1ee88be7137bb9c6b3
-
Filesize
512KB
MD5f5ad538ffae56ac93538650f0eb1dc9f
SHA16805fc56a87ad26685de5ced063f9f3ca21a7c52
SHA256bc403b80b42c94d60e425e9b4a79c3debecc1b3967e6277f49b886b2b95b6791
SHA512dd95f22d8efb7c92573cfc41f23ee4216179ce730619f2a49d4c77190aeac5997bd8951cecbdfdd00a44476fb0817641997ad5beccff9d3d2c2fadf5f20ef254
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD52ac7cafdb806da25b4686baba2dad61a
SHA1bec9fee66514853c3639b4962532e6cc65168c7b
SHA256368155f422ac69bd77c9e51aa4a3beb21a985139bb5e3cb86395216229b87087
SHA5120e9cf55f30e48dfaf6cb24a3c744d836a9bc7e78d1a914de850d312d27d6a6a1fc6e263f3a54c3206491ef2185b1ec177a5287765a06cc7d86e7f61ba3f5d620
-
Filesize
512KB
MD53c83faa3316df5640f3e856cc8476aa3
SHA11f20c9b93c12b0428a7660c202adc79a97f4c718
SHA25667abc0609913d0b87a43691e81dd643d1373317bcbe950812859c24478445834
SHA5126986cfcfdff1fc42222e42b70a82a56d2dadaaf0b8f2324444d81475596c0fad69c78863300753a3debd60a43f52f8200b2a216367e502b03d378b355c095368