Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:57

General

  • Target

    69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    69372530a76fd92c6fb4d01313d9b370

  • SHA1

    7bbadececbf02a60a519e1f9a5b08a25e6a857db

  • SHA256

    a2d2a9f61da9da9b3eff26e050c41411904f89975565fd315fd7c2519fef1875

  • SHA512

    5b2909611e784b97494cfa8fdd00318b87012debdd139363aa560280c7a12f4bb97a3868349d3644e754668c0a08b90b738447f65367737300e8d5a8584b7ee3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6J:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5+

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Windows\SysWOW64\wjlyzgarwi.exe
      wjlyzgarwi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\SysWOW64\stjbgwvi.exe
        C:\Windows\system32\stjbgwvi.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4296
    • C:\Windows\SysWOW64\qjtnymkwmcmsjdp.exe
      qjtnymkwmcmsjdp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2824
    • C:\Windows\SysWOW64\stjbgwvi.exe
      stjbgwvi.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1564
    • C:\Windows\SysWOW64\gnevukspxsexl.exe
      gnevukspxsexl.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4008
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2036
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2492,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
    1⤵
      PID:1096

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    6
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    4
    T1012

    System Information Discovery

    5
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe
      Filesize

      512KB

      MD5

      9845d55e07a3b8fb0a05bf489d237d3e

      SHA1

      43dc647bab32ef1ee6dd9eadb0a88b4d175f6ea7

      SHA256

      36a70624659bf734c040ec861afffd4402ef70aa89307c57d16dc51ddddf3b38

      SHA512

      331bb074f1bd35b94759f42cd9b7692433d463dc5eb8d46d265f004dd3cb6fee4c4277f949bf48f6473dddb8e6d2e228c17229c8300902bc17947794da119d19

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe
      Filesize

      512KB

      MD5

      6f38f66c314830175d1e6ef90e3856fd

      SHA1

      e8d998a8f60b8633e2ca68934cf09e97f8561e8d

      SHA256

      cd50a10a500efa07be9a8ed7fc12b3da72e3f3bed81a17c34bbcb1d0d87ae659

      SHA512

      72098c207d37eba9248bb88697882b10d6221856b13b45486a6281ba77c516bbe889fedbe1fb97ff87b62d7c95df2b3dbb21bd22d7abbc33a192a46c4f0d07fe

    • C:\Users\Admin\AppData\Local\Temp\TCD32CC.tmp\iso690.xsl
      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      239B

      MD5

      602dad6ee0e60cde6698692534ef100b

      SHA1

      c3e20be4cf62746964ff865964f4f354d412bfac

      SHA256

      596069f7c5d4c9cea8266af60fcc730fbaec42eb5dd0c6f4203e463b742fb598

      SHA512

      bc1fdcc479d9d46977847557985ca1744f1d4f135da27d82dd2f131419c16fbc70968eb27458a1769e59a9a166847be39aa81b82936e39e753d578ee13df8669

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
      Filesize

      3KB

      MD5

      9a2996d06f5896cbb5d7a93fb0157b5c

      SHA1

      f361f1faf32a8b521710281d101b884c06392949

      SHA256

      d7e3c253196b078a6c78dfa5149115a9750a221c1c6736f14737bc94f768a095

      SHA512

      7999b36db3c63ec581f2affe446d1a8cd28c002eb36f5cf4fc50c702b48276fbc979081ce4188ad60127ff9ed657da2e32728d66865ce60b461d4fdb44f9e332

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
      Filesize

      3KB

      MD5

      24cb4f7e091ea924fab4168cd7bf8885

      SHA1

      8be5a703fc2ddf4a1ba8117f5c85e4ce6945d366

      SHA256

      1430e8e9429fe20f5b0f45dca3727ab1f900eaf92bcfc60ac6ac20d583a2fa99

      SHA512

      519dbfe621dd8132403113ad630956d923f1da26c05ce315d9e2958b6078bc4f120ea9e4e407724949d6084c06ac498665002172a92222f3488587bda45980d6

    • C:\Users\Admin\Documents\HideStop.doc.exe
      Filesize

      512KB

      MD5

      ab1c9f8fcc31c2615c7554c463ed824f

      SHA1

      a1c7ed0fe92c039d57f326156f169df80f7db5d6

      SHA256

      0b5f223a76a6b77a6ac1cd8c8beb221534da24c131e87bc6062c71b579e738fd

      SHA512

      f58a0ff6cd849d227d80cc78380f33eeef215037b47ab9b3b736d69986d5bc5b289b690aaff02dd6012cec8b113fd51c0a96d97d1d5e354a0233ed494ff8becc

    • C:\Windows\SysWOW64\gnevukspxsexl.exe
      Filesize

      512KB

      MD5

      c94135e5e2aab2f37a17f761da92a8a2

      SHA1

      e612148f0ee175bf2b3a4561b300e79b16200190

      SHA256

      4c92b4138e0fa8c3f5e5385b50cc71ea86761622c1ce72390f2133f1326e76d0

      SHA512

      dfb2922d0bd727b408de2da5e7ecdf42643c462b20dae4a6c8dcfdaf5dfda5bdd74494453b878b3b94d05f8b284bcf6eff9f4a32ee1a1f89abf806b3a161b15d

    • C:\Windows\SysWOW64\qjtnymkwmcmsjdp.exe
      Filesize

      512KB

      MD5

      f9f8805e630dbf4d3bacbd2770101e31

      SHA1

      abc5aa95a0fa35f416aa65d7f48a42d350e24ef5

      SHA256

      5dae32ada87c69d0ce4a040338b2169ab186a4f1e83df68c6af9275f1f65b614

      SHA512

      6aba47e47441cab6fde91e04b5c8e044ac7d990c6219d3fae4fa0b289a1ecb71224e375ceae6b8705b8ce025dd4c6fc637b6f44077341f93aa312ba49bea757e

    • C:\Windows\SysWOW64\stjbgwvi.exe
      Filesize

      512KB

      MD5

      db82da0e1016bcf6c06f7985f173ebeb

      SHA1

      0cb639e6891121b25e63dd907edd5117dcc9be76

      SHA256

      eeffa218434599a9290294c7ec51fbb86297186909d58cc9bca1381c01545039

      SHA512

      07fe4731d7dd7f88643dd8f57dbe751cd8961fae1306673ac04d43f048441cf1063522e68d77d2088e2b1fda84f1cd90553282ac651135818dc9862557f141a7

    • C:\Windows\SysWOW64\wjlyzgarwi.exe
      Filesize

      512KB

      MD5

      ad0cd5da13a9bf84d9af5b82eb1c737a

      SHA1

      04fc37472dd556237934e90e30624673dbfd401a

      SHA256

      a5a794561a36ea8e78d4e170328ceb4a07267827779e8b7a65fbfc2e98682b24

      SHA512

      cde07ac13028573234faaf9d0dba4300f6e8d8e405ee16b3eff135c48be5d25c0274d970a7a43cd10b1d87efa3ea7926a06f7c2975ea9f25faddb2b0f499f7f7

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
      Filesize

      512KB

      MD5

      911f19623a117ad4d274c34f8be126a2

      SHA1

      c45fd4090cbd400d3bba22b3a0c0e86eeb5a33a2

      SHA256

      c2d40742e5b8f638e1ff624de41df72ec5481e75623255559dd6d733d05ea0ca

      SHA512

      c6f2f192302c4d031b74e7d6ab6e34e21eb0d3c2d5845ab92ebc926a917397996b22010ab270f54e1b017ab2b07e982a8849209d8d6a63f1dd2c76bfa6a388c4

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
      Filesize

      512KB

      MD5

      b5a7957fcaf869f3e736a7ee9b10b960

      SHA1

      3cdfc83ccc72dda8ac777462aa1676a19536b2fb

      SHA256

      8ba6f778db22ddde0f4a2d282abfd1029a6af438e86dc1ead9ba768c40aa9ace

      SHA512

      e12221400c4a8b0b3c64a1e6e4c7efe1d109a36c689ff1dfc91217d6a4c2153242d10daf55308158ca17356480835041e700f326f7b67ed91e7d0a87eb1a1387

    • memory/2036-39-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-38-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-36-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-37-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-40-0x00007FFBD43B0000-0x00007FFBD43C0000-memory.dmp
      Filesize

      64KB

    • memory/2036-35-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-41-0x00007FFBD43B0000-0x00007FFBD43C0000-memory.dmp
      Filesize

      64KB

    • memory/2036-602-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-603-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-601-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/2036-604-0x00007FFBD6BB0000-0x00007FFBD6BC0000-memory.dmp
      Filesize

      64KB

    • memory/4576-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB