Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe
-
Size
512KB
-
MD5
691c5c1186c1c886308e587b1d0812a1
-
SHA1
c54137582681733ad897e331ca2d0a414f24e3ec
-
SHA256
44125ca888c97f6f3396171426c72b77d1a8df376ff82b0c19112f7713571e46
-
SHA512
a7eaf74da7254d44899f8f852189ce8dd9434c323a2751243332fe31ab56300c60dfe507b5773083bb43584947aa8db597f1a235755e6fa8047cbf584ec9a4f3
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6j:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5M
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
dbjpgikdul.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dbjpgikdul.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
dbjpgikdul.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dbjpgikdul.exe -
Processes:
dbjpgikdul.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dbjpgikdul.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
dbjpgikdul.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dbjpgikdul.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
dbjpgikdul.exesdrchastmsiekew.exegvwkcsou.exeqsahcerlebjzi.exegvwkcsou.exepid process 2992 dbjpgikdul.exe 3764 sdrchastmsiekew.exe 3920 gvwkcsou.exe 3020 qsahcerlebjzi.exe 2952 gvwkcsou.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
dbjpgikdul.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dbjpgikdul.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
sdrchastmsiekew.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ohaivajd = "sdrchastmsiekew.exe" sdrchastmsiekew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qsahcerlebjzi.exe" sdrchastmsiekew.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wldtewum = "dbjpgikdul.exe" sdrchastmsiekew.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dbjpgikdul.exegvwkcsou.exegvwkcsou.exedescription ioc process File opened (read-only) \??\i: dbjpgikdul.exe File opened (read-only) \??\z: dbjpgikdul.exe File opened (read-only) \??\s: gvwkcsou.exe File opened (read-only) \??\b: gvwkcsou.exe File opened (read-only) \??\g: gvwkcsou.exe File opened (read-only) \??\a: dbjpgikdul.exe File opened (read-only) \??\k: gvwkcsou.exe File opened (read-only) \??\x: gvwkcsou.exe File opened (read-only) \??\s: gvwkcsou.exe File opened (read-only) \??\z: gvwkcsou.exe File opened (read-only) \??\t: gvwkcsou.exe File opened (read-only) \??\n: gvwkcsou.exe File opened (read-only) \??\p: gvwkcsou.exe File opened (read-only) \??\s: dbjpgikdul.exe File opened (read-only) \??\v: gvwkcsou.exe File opened (read-only) \??\w: gvwkcsou.exe File opened (read-only) \??\x: gvwkcsou.exe File opened (read-only) \??\q: dbjpgikdul.exe File opened (read-only) \??\b: gvwkcsou.exe File opened (read-only) \??\i: gvwkcsou.exe File opened (read-only) \??\j: gvwkcsou.exe File opened (read-only) \??\p: gvwkcsou.exe File opened (read-only) \??\j: gvwkcsou.exe File opened (read-only) \??\k: dbjpgikdul.exe File opened (read-only) \??\a: gvwkcsou.exe File opened (read-only) \??\g: gvwkcsou.exe File opened (read-only) \??\q: gvwkcsou.exe File opened (read-only) \??\m: gvwkcsou.exe File opened (read-only) \??\u: dbjpgikdul.exe File opened (read-only) \??\h: gvwkcsou.exe File opened (read-only) \??\n: gvwkcsou.exe File opened (read-only) \??\e: dbjpgikdul.exe File opened (read-only) \??\y: dbjpgikdul.exe File opened (read-only) \??\m: dbjpgikdul.exe File opened (read-only) \??\n: dbjpgikdul.exe File opened (read-only) \??\o: dbjpgikdul.exe File opened (read-only) \??\t: dbjpgikdul.exe File opened (read-only) \??\l: gvwkcsou.exe File opened (read-only) \??\z: gvwkcsou.exe File opened (read-only) \??\i: gvwkcsou.exe File opened (read-only) \??\v: gvwkcsou.exe File opened (read-only) \??\b: dbjpgikdul.exe File opened (read-only) \??\h: dbjpgikdul.exe File opened (read-only) \??\p: dbjpgikdul.exe File opened (read-only) \??\v: dbjpgikdul.exe File opened (read-only) \??\o: gvwkcsou.exe File opened (read-only) \??\l: gvwkcsou.exe File opened (read-only) \??\q: gvwkcsou.exe File opened (read-only) \??\o: gvwkcsou.exe File opened (read-only) \??\l: dbjpgikdul.exe File opened (read-only) \??\u: gvwkcsou.exe File opened (read-only) \??\y: gvwkcsou.exe File opened (read-only) \??\a: gvwkcsou.exe File opened (read-only) \??\e: gvwkcsou.exe File opened (read-only) \??\j: dbjpgikdul.exe File opened (read-only) \??\r: gvwkcsou.exe File opened (read-only) \??\w: gvwkcsou.exe File opened (read-only) \??\k: gvwkcsou.exe File opened (read-only) \??\g: dbjpgikdul.exe File opened (read-only) \??\u: gvwkcsou.exe File opened (read-only) \??\r: dbjpgikdul.exe File opened (read-only) \??\x: dbjpgikdul.exe File opened (read-only) \??\e: gvwkcsou.exe File opened (read-only) \??\m: gvwkcsou.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
dbjpgikdul.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" dbjpgikdul.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" dbjpgikdul.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4308-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\sdrchastmsiekew.exe autoit_exe C:\Windows\SysWOW64\dbjpgikdul.exe autoit_exe C:\Windows\SysWOW64\qsahcerlebjzi.exe autoit_exe C:\Windows\SysWOW64\gvwkcsou.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
dbjpgikdul.exegvwkcsou.exe691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exegvwkcsou.exedescription ioc process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll dbjpgikdul.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification C:\Windows\SysWOW64\dbjpgikdul.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File created C:\Windows\SysWOW64\sdrchastmsiekew.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sdrchastmsiekew.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File created C:\Windows\SysWOW64\gvwkcsou.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gvwkcsou.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File created C:\Windows\SysWOW64\qsahcerlebjzi.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File created C:\Windows\SysWOW64\dbjpgikdul.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qsahcerlebjzi.exe 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gvwkcsou.exe -
Drops file in Program Files directory 14 IoCs
Processes:
gvwkcsou.exegvwkcsou.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gvwkcsou.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gvwkcsou.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gvwkcsou.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gvwkcsou.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gvwkcsou.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gvwkcsou.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gvwkcsou.exe -
Drops file in Windows directory 19 IoCs
Processes:
gvwkcsou.exegvwkcsou.exe691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification C:\Windows\mydoc.rtf 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gvwkcsou.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gvwkcsou.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gvwkcsou.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
dbjpgikdul.exe691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh dbjpgikdul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" dbjpgikdul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat dbjpgikdul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc dbjpgikdul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf dbjpgikdul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" dbjpgikdul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F66BB9FE1B22DCD20CD1A98B7C9167" 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC67915E3DAB2B9B97CE5ED9434CD" 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FCFF485885199142D75B7E97BDE1E137594567366234D79D" 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" dbjpgikdul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg dbjpgikdul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33472C7A9C2382246A4476A070562CDA7CF464AC" 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B02C449039E953CDB9D1329AD4B8" 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" dbjpgikdul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" dbjpgikdul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs dbjpgikdul.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" dbjpgikdul.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCDFAB0FE16F1E383783B4081983E95B0F9038C4361033CE1C5429E09D4" 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1672 WINWORD.EXE 1672 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exeqsahcerlebjzi.exesdrchastmsiekew.exedbjpgikdul.exegvwkcsou.exegvwkcsou.exepid process 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3020 qsahcerlebjzi.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3020 qsahcerlebjzi.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3920 gvwkcsou.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 2952 gvwkcsou.exe 2952 gvwkcsou.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exesdrchastmsiekew.exeqsahcerlebjzi.exedbjpgikdul.exegvwkcsou.exegvwkcsou.exepid process 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 2952 gvwkcsou.exe 2952 gvwkcsou.exe 2952 gvwkcsou.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exesdrchastmsiekew.exeqsahcerlebjzi.exedbjpgikdul.exegvwkcsou.exegvwkcsou.exepid process 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3764 sdrchastmsiekew.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 3020 qsahcerlebjzi.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 2992 dbjpgikdul.exe 3920 gvwkcsou.exe 2952 gvwkcsou.exe 2952 gvwkcsou.exe 2952 gvwkcsou.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1672 WINWORD.EXE 1672 WINWORD.EXE 1672 WINWORD.EXE 1672 WINWORD.EXE 1672 WINWORD.EXE 1672 WINWORD.EXE 1672 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exedbjpgikdul.exedescription pid process target process PID 4308 wrote to memory of 2992 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe dbjpgikdul.exe PID 4308 wrote to memory of 2992 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe dbjpgikdul.exe PID 4308 wrote to memory of 2992 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe dbjpgikdul.exe PID 4308 wrote to memory of 3764 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe sdrchastmsiekew.exe PID 4308 wrote to memory of 3764 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe sdrchastmsiekew.exe PID 4308 wrote to memory of 3764 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe sdrchastmsiekew.exe PID 4308 wrote to memory of 3920 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe gvwkcsou.exe PID 4308 wrote to memory of 3920 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe gvwkcsou.exe PID 4308 wrote to memory of 3920 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe gvwkcsou.exe PID 4308 wrote to memory of 3020 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe qsahcerlebjzi.exe PID 4308 wrote to memory of 3020 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe qsahcerlebjzi.exe PID 4308 wrote to memory of 3020 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe qsahcerlebjzi.exe PID 4308 wrote to memory of 1672 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe WINWORD.EXE PID 4308 wrote to memory of 1672 4308 691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe WINWORD.EXE PID 2992 wrote to memory of 2952 2992 dbjpgikdul.exe gvwkcsou.exe PID 2992 wrote to memory of 2952 2992 dbjpgikdul.exe gvwkcsou.exe PID 2992 wrote to memory of 2952 2992 dbjpgikdul.exe gvwkcsou.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\691c5c1186c1c886308e587b1d0812a1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\dbjpgikdul.exedbjpgikdul.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\gvwkcsou.exeC:\Windows\system32\gvwkcsou.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2952
-
-
-
C:\Windows\SysWOW64\sdrchastmsiekew.exesdrchastmsiekew.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3764
-
-
C:\Windows\SysWOW64\gvwkcsou.exegvwkcsou.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3920
-
-
C:\Windows\SysWOW64\qsahcerlebjzi.exeqsahcerlebjzi.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3020
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD522213c2ffe8b0928d1bfe9bffa224908
SHA16e227cf9bd7b6742cd2c57b3888e35b35651eee3
SHA2563c1f7acd1ef99db6926203f4ce4631bc990e9cafc80264a21b56fac0c0d1c049
SHA512740cea42feb9447feb2919bf041a1e36c06e0f96ddc834879727993b222b37bf6e2cf41a4089e9f0dabf124f74f1932f64593b43985c7b4e38a63e7946f18ee7
-
Filesize
512KB
MD59906ef9b46fb8bade5affdc221d567ae
SHA174fa0aba1971b3452cc8928a3fa878ad05b0d97c
SHA25673d63926cb9bb06ce9b3f410e312ad42a2e078c3de3219d7d184e388b908646d
SHA5124e623e9976a2f43cd5198ac11f9fdc17ae10e7ec66d77adb435a0c4be94c8b858197ad9f22ea65bf14bc8c8f6d62aabcdea502ed92546d364f86cf3219e66eb6
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59ee5cc05bdbf459cafe92159e91fbb79
SHA19cfd40020645806a23a36b3756e76876f7cf9f6a
SHA256d0f394fe347075fb9319067c83b437a4ac78e9980d5c2c9a3049a252ce3ef344
SHA512546445b8c38bcb6c755d60610e5a6317dbc9ba339a4b6fa14c32190d6fb2b6587342945f03ca135cca696924a434ac297ffc6af117da68b4563a1dffef614d90
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5714f32103439ce3c13ca0234a6cb3c47
SHA1345ab64b85058c795179c4bef76ce7d6895bfd91
SHA256993fde85fc0b90125d3c10725dd5e7d49bd5b4f2b48f6d846a18011702ed667a
SHA51211584a173c8e43af68b013a383aa421c0eab543af7e3668dac0d181bbdf2c3349de7aaef567fe0a09495fea3bb54a74527a7e106a6fd7b50a89291d2878f6d04
-
Filesize
512KB
MD5e621d041fbdc8d6e6e59a826f4877efb
SHA10b19841dbde6ea7c3c09407e8768780ca98ab7bd
SHA256e65ceab79f3400576cd8283a909392e40d812925e4ed4f45c1564b7f726c00d4
SHA512141ce1ddf1e7c71fe66f67b6ed2eab1d57735bb247d9b09138eaefa444c5b40271ccb537f983434d52326c0c2ae5a524382109028a10f050c9ef0e964f95a16c
-
Filesize
512KB
MD5bfde030e47f67619188fde648b6cbbda
SHA16f30102c6de6b91c8b955b075ca095c96496d7e7
SHA2567d64ed58c7a8c2b765119978008598048f7e581929e7ff32b99d075eefde773f
SHA5122ff90f5e130cc09932b7d79214055c48377f0c113ddfb7a5c8d1a1b138e926c0286689c37dfa7d605d1d79918eb7647535a2b8e296a5b826a829ee93c44ff7a6
-
Filesize
512KB
MD5e0111284a647640af0e5c71c21131e4c
SHA1ce048c91ea4073060a332a5a23b58f4985fcd5b8
SHA256b27036be00ab17f9774686b2a55fad6ac031468f3b89d01015cc6a96e86784a2
SHA512556d831f11b3c65ba7ce3eebe66789c6febf74a04edae29620562030cc593d17e5a6ad505b511cc08375d5489753874d7f784fe36fadb55654bffe07154123fa
-
Filesize
512KB
MD5ef87b6803d240bbaed9ac3aca49db275
SHA1f03564768147747da2ea9b893bc79e770abe86f9
SHA2562b6bd786cc07262082868cdff50bb9e4053276db4cbf244100252851166100bb
SHA5123be914d92075e2dd8956a685643232df412f7a5faa4b485a05f963a1e9d9e9edc57c54d63855a4c4da9de8c3758b621a7f15a94d0ff0ff02ab11681b299e6a3a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD50e30a69f04b39daeb9964c6972a710bd
SHA172d2d8f7cdda7b2978f549ab57b23a1978526b86
SHA25649d70221004be822974eb3f257d5b350c133f502fa231983aa87150c05609e65
SHA512532ed3ac08907fa7faa92717236af7d171a241073d224e90912a59131fc7cdca32d1cfd476227840b93133cc5893073fc9209b09f21e43b0b172038715008e54
-
Filesize
512KB
MD529f2c27e4691e21ff829ef56baee66f2
SHA1bbf09069b24b6e6e0edfde8448464a01a1c4fa76
SHA256872f8d9cda91b597594c045c1c417ae6445e123ab3eee959a02dfb2352d36899
SHA512b531bdd18c10fc8e03d174f4d599a37137232bbca9b8f6af725e504912a84b0b65d8dbfcb46f9f623f27c25da79ae8af15d9a92effd848a67e9ce88ba2b1d5cc