Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe
-
Size
512KB
-
MD5
69372530a76fd92c6fb4d01313d9b370
-
SHA1
7bbadececbf02a60a519e1f9a5b08a25e6a857db
-
SHA256
a2d2a9f61da9da9b3eff26e050c41411904f89975565fd315fd7c2519fef1875
-
SHA512
5b2909611e784b97494cfa8fdd00318b87012debdd139363aa560280c7a12f4bb97a3868349d3644e754668c0a08b90b738447f65367737300e8d5a8584b7ee3
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6J:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
wjlyzgarwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wjlyzgarwi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
wjlyzgarwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wjlyzgarwi.exe -
Processes:
wjlyzgarwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wjlyzgarwi.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
wjlyzgarwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wjlyzgarwi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
wjlyzgarwi.exeqjtnymkwmcmsjdp.exestjbgwvi.exegnevukspxsexl.exestjbgwvi.exepid process 1904 wjlyzgarwi.exe 2824 qjtnymkwmcmsjdp.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 4296 stjbgwvi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
wjlyzgarwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wjlyzgarwi.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
qjtnymkwmcmsjdp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "gnevukspxsexl.exe" qjtnymkwmcmsjdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kbkuzdys = "wjlyzgarwi.exe" qjtnymkwmcmsjdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nasnojhb = "qjtnymkwmcmsjdp.exe" qjtnymkwmcmsjdp.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
stjbgwvi.exestjbgwvi.exewjlyzgarwi.exedescription ioc process File opened (read-only) \??\a: stjbgwvi.exe File opened (read-only) \??\l: stjbgwvi.exe File opened (read-only) \??\p: stjbgwvi.exe File opened (read-only) \??\t: stjbgwvi.exe File opened (read-only) \??\b: stjbgwvi.exe File opened (read-only) \??\l: stjbgwvi.exe File opened (read-only) \??\u: stjbgwvi.exe File opened (read-only) \??\o: stjbgwvi.exe File opened (read-only) \??\i: wjlyzgarwi.exe File opened (read-only) \??\j: wjlyzgarwi.exe File opened (read-only) \??\l: wjlyzgarwi.exe File opened (read-only) \??\x: wjlyzgarwi.exe File opened (read-only) \??\h: stjbgwvi.exe File opened (read-only) \??\m: wjlyzgarwi.exe File opened (read-only) \??\z: stjbgwvi.exe File opened (read-only) \??\s: stjbgwvi.exe File opened (read-only) \??\t: wjlyzgarwi.exe File opened (read-only) \??\n: stjbgwvi.exe File opened (read-only) \??\o: stjbgwvi.exe File opened (read-only) \??\b: stjbgwvi.exe File opened (read-only) \??\n: stjbgwvi.exe File opened (read-only) \??\b: wjlyzgarwi.exe File opened (read-only) \??\v: stjbgwvi.exe File opened (read-only) \??\h: wjlyzgarwi.exe File opened (read-only) \??\e: stjbgwvi.exe File opened (read-only) \??\x: stjbgwvi.exe File opened (read-only) \??\a: stjbgwvi.exe File opened (read-only) \??\i: stjbgwvi.exe File opened (read-only) \??\g: wjlyzgarwi.exe File opened (read-only) \??\q: wjlyzgarwi.exe File opened (read-only) \??\s: wjlyzgarwi.exe File opened (read-only) \??\q: stjbgwvi.exe File opened (read-only) \??\w: wjlyzgarwi.exe File opened (read-only) \??\g: stjbgwvi.exe File opened (read-only) \??\k: stjbgwvi.exe File opened (read-only) \??\w: stjbgwvi.exe File opened (read-only) \??\u: wjlyzgarwi.exe File opened (read-only) \??\q: stjbgwvi.exe File opened (read-only) \??\s: stjbgwvi.exe File opened (read-only) \??\v: stjbgwvi.exe File opened (read-only) \??\u: stjbgwvi.exe File opened (read-only) \??\y: wjlyzgarwi.exe File opened (read-only) \??\h: stjbgwvi.exe File opened (read-only) \??\w: stjbgwvi.exe File opened (read-only) \??\v: wjlyzgarwi.exe File opened (read-only) \??\z: wjlyzgarwi.exe File opened (read-only) \??\j: stjbgwvi.exe File opened (read-only) \??\g: stjbgwvi.exe File opened (read-only) \??\k: stjbgwvi.exe File opened (read-only) \??\m: stjbgwvi.exe File opened (read-only) \??\z: stjbgwvi.exe File opened (read-only) \??\e: wjlyzgarwi.exe File opened (read-only) \??\j: stjbgwvi.exe File opened (read-only) \??\p: stjbgwvi.exe File opened (read-only) \??\p: wjlyzgarwi.exe File opened (read-only) \??\m: stjbgwvi.exe File opened (read-only) \??\t: stjbgwvi.exe File opened (read-only) \??\y: stjbgwvi.exe File opened (read-only) \??\r: stjbgwvi.exe File opened (read-only) \??\x: stjbgwvi.exe File opened (read-only) \??\o: wjlyzgarwi.exe File opened (read-only) \??\i: stjbgwvi.exe File opened (read-only) \??\r: stjbgwvi.exe File opened (read-only) \??\r: wjlyzgarwi.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
wjlyzgarwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" wjlyzgarwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" wjlyzgarwi.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4576-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\qjtnymkwmcmsjdp.exe autoit_exe C:\Windows\SysWOW64\gnevukspxsexl.exe autoit_exe C:\Windows\SysWOW64\stjbgwvi.exe autoit_exe C:\Windows\SysWOW64\wjlyzgarwi.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Users\Admin\Documents\HideStop.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exestjbgwvi.exewjlyzgarwi.exestjbgwvi.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wjlyzgarwi.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File created C:\Windows\SysWOW64\qjtnymkwmcmsjdp.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\stjbgwvi.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File created C:\Windows\SysWOW64\gnevukspxsexl.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe stjbgwvi.exe File created C:\Windows\SysWOW64\wjlyzgarwi.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qjtnymkwmcmsjdp.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File created C:\Windows\SysWOW64\stjbgwvi.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gnevukspxsexl.exe 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll wjlyzgarwi.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe stjbgwvi.exe -
Drops file in Program Files directory 15 IoCs
Processes:
stjbgwvi.exestjbgwvi.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal stjbgwvi.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal stjbgwvi.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe stjbgwvi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe stjbgwvi.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe stjbgwvi.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe stjbgwvi.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe stjbgwvi.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe stjbgwvi.exe -
Drops file in Windows directory 19 IoCs
Processes:
stjbgwvi.exestjbgwvi.exeWINWORD.EXE69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exedescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe stjbgwvi.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe stjbgwvi.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe stjbgwvi.exe File opened for modification C:\Windows\mydoc.rtf 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
wjlyzgarwi.exe69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4FABEFE10F19784793B3586E93E96B0F9028C4365023AE1C4429D09D1" 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh wjlyzgarwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc wjlyzgarwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB1B02E47E4399953C9B9D53393D7CF" 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8FFF89485C8268903DD72C7E96BC94E643584467426236D798" 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7836BB7FE6F22DDD17AD0D18B099010" 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs wjlyzgarwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg wjlyzgarwi.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32442C0D9C2582566D3676D770272DDC7CF264AB" 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wjlyzgarwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184EC60914E1DAB5B8CB7C97ED9634CB" 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" wjlyzgarwi.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2036 WINWORD.EXE 2036 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exeqjtnymkwmcmsjdp.exewjlyzgarwi.exestjbgwvi.exegnevukspxsexl.exestjbgwvi.exepid process 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 1564 stjbgwvi.exe 1564 stjbgwvi.exe 1564 stjbgwvi.exe 1564 stjbgwvi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 1564 stjbgwvi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4008 gnevukspxsexl.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exeqjtnymkwmcmsjdp.exewjlyzgarwi.exestjbgwvi.exegnevukspxsexl.exestjbgwvi.exepid process 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exeqjtnymkwmcmsjdp.exewjlyzgarwi.exestjbgwvi.exegnevukspxsexl.exestjbgwvi.exepid process 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 2824 qjtnymkwmcmsjdp.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 1904 wjlyzgarwi.exe 1564 stjbgwvi.exe 4008 gnevukspxsexl.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe 4296 stjbgwvi.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2036 WINWORD.EXE 2036 WINWORD.EXE 2036 WINWORD.EXE 2036 WINWORD.EXE 2036 WINWORD.EXE 2036 WINWORD.EXE 2036 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exewjlyzgarwi.exedescription pid process target process PID 4576 wrote to memory of 1904 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe wjlyzgarwi.exe PID 4576 wrote to memory of 1904 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe wjlyzgarwi.exe PID 4576 wrote to memory of 1904 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe wjlyzgarwi.exe PID 4576 wrote to memory of 2824 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe qjtnymkwmcmsjdp.exe PID 4576 wrote to memory of 2824 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe qjtnymkwmcmsjdp.exe PID 4576 wrote to memory of 2824 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe qjtnymkwmcmsjdp.exe PID 4576 wrote to memory of 1564 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe stjbgwvi.exe PID 4576 wrote to memory of 1564 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe stjbgwvi.exe PID 4576 wrote to memory of 1564 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe stjbgwvi.exe PID 4576 wrote to memory of 4008 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe gnevukspxsexl.exe PID 4576 wrote to memory of 4008 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe gnevukspxsexl.exe PID 4576 wrote to memory of 4008 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe gnevukspxsexl.exe PID 4576 wrote to memory of 2036 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe WINWORD.EXE PID 4576 wrote to memory of 2036 4576 69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe WINWORD.EXE PID 1904 wrote to memory of 4296 1904 wjlyzgarwi.exe stjbgwvi.exe PID 1904 wrote to memory of 4296 1904 wjlyzgarwi.exe stjbgwvi.exe PID 1904 wrote to memory of 4296 1904 wjlyzgarwi.exe stjbgwvi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69372530a76fd92c6fb4d01313d9b370_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\wjlyzgarwi.exewjlyzgarwi.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\stjbgwvi.exeC:\Windows\system32\stjbgwvi.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4296 -
C:\Windows\SysWOW64\qjtnymkwmcmsjdp.exeqjtnymkwmcmsjdp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824 -
C:\Windows\SysWOW64\stjbgwvi.exestjbgwvi.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1564 -
C:\Windows\SysWOW64\gnevukspxsexl.exegnevukspxsexl.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4008 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2492,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:81⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD59845d55e07a3b8fb0a05bf489d237d3e
SHA143dc647bab32ef1ee6dd9eadb0a88b4d175f6ea7
SHA25636a70624659bf734c040ec861afffd4402ef70aa89307c57d16dc51ddddf3b38
SHA512331bb074f1bd35b94759f42cd9b7692433d463dc5eb8d46d265f004dd3cb6fee4c4277f949bf48f6473dddb8e6d2e228c17229c8300902bc17947794da119d19
-
Filesize
512KB
MD56f38f66c314830175d1e6ef90e3856fd
SHA1e8d998a8f60b8633e2ca68934cf09e97f8561e8d
SHA256cd50a10a500efa07be9a8ed7fc12b3da72e3f3bed81a17c34bbcb1d0d87ae659
SHA51272098c207d37eba9248bb88697882b10d6221856b13b45486a6281ba77c516bbe889fedbe1fb97ff87b62d7c95df2b3dbb21bd22d7abbc33a192a46c4f0d07fe
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
239B
MD5602dad6ee0e60cde6698692534ef100b
SHA1c3e20be4cf62746964ff865964f4f354d412bfac
SHA256596069f7c5d4c9cea8266af60fcc730fbaec42eb5dd0c6f4203e463b742fb598
SHA512bc1fdcc479d9d46977847557985ca1744f1d4f135da27d82dd2f131419c16fbc70968eb27458a1769e59a9a166847be39aa81b82936e39e753d578ee13df8669
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59a2996d06f5896cbb5d7a93fb0157b5c
SHA1f361f1faf32a8b521710281d101b884c06392949
SHA256d7e3c253196b078a6c78dfa5149115a9750a221c1c6736f14737bc94f768a095
SHA5127999b36db3c63ec581f2affe446d1a8cd28c002eb36f5cf4fc50c702b48276fbc979081ce4188ad60127ff9ed657da2e32728d66865ce60b461d4fdb44f9e332
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD524cb4f7e091ea924fab4168cd7bf8885
SHA18be5a703fc2ddf4a1ba8117f5c85e4ce6945d366
SHA2561430e8e9429fe20f5b0f45dca3727ab1f900eaf92bcfc60ac6ac20d583a2fa99
SHA512519dbfe621dd8132403113ad630956d923f1da26c05ce315d9e2958b6078bc4f120ea9e4e407724949d6084c06ac498665002172a92222f3488587bda45980d6
-
Filesize
512KB
MD5ab1c9f8fcc31c2615c7554c463ed824f
SHA1a1c7ed0fe92c039d57f326156f169df80f7db5d6
SHA2560b5f223a76a6b77a6ac1cd8c8beb221534da24c131e87bc6062c71b579e738fd
SHA512f58a0ff6cd849d227d80cc78380f33eeef215037b47ab9b3b736d69986d5bc5b289b690aaff02dd6012cec8b113fd51c0a96d97d1d5e354a0233ed494ff8becc
-
Filesize
512KB
MD5c94135e5e2aab2f37a17f761da92a8a2
SHA1e612148f0ee175bf2b3a4561b300e79b16200190
SHA2564c92b4138e0fa8c3f5e5385b50cc71ea86761622c1ce72390f2133f1326e76d0
SHA512dfb2922d0bd727b408de2da5e7ecdf42643c462b20dae4a6c8dcfdaf5dfda5bdd74494453b878b3b94d05f8b284bcf6eff9f4a32ee1a1f89abf806b3a161b15d
-
Filesize
512KB
MD5f9f8805e630dbf4d3bacbd2770101e31
SHA1abc5aa95a0fa35f416aa65d7f48a42d350e24ef5
SHA2565dae32ada87c69d0ce4a040338b2169ab186a4f1e83df68c6af9275f1f65b614
SHA5126aba47e47441cab6fde91e04b5c8e044ac7d990c6219d3fae4fa0b289a1ecb71224e375ceae6b8705b8ce025dd4c6fc637b6f44077341f93aa312ba49bea757e
-
Filesize
512KB
MD5db82da0e1016bcf6c06f7985f173ebeb
SHA10cb639e6891121b25e63dd907edd5117dcc9be76
SHA256eeffa218434599a9290294c7ec51fbb86297186909d58cc9bca1381c01545039
SHA51207fe4731d7dd7f88643dd8f57dbe751cd8961fae1306673ac04d43f048441cf1063522e68d77d2088e2b1fda84f1cd90553282ac651135818dc9862557f141a7
-
Filesize
512KB
MD5ad0cd5da13a9bf84d9af5b82eb1c737a
SHA104fc37472dd556237934e90e30624673dbfd401a
SHA256a5a794561a36ea8e78d4e170328ceb4a07267827779e8b7a65fbfc2e98682b24
SHA512cde07ac13028573234faaf9d0dba4300f6e8d8e405ee16b3eff135c48be5d25c0274d970a7a43cd10b1d87efa3ea7926a06f7c2975ea9f25faddb2b0f499f7f7
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5911f19623a117ad4d274c34f8be126a2
SHA1c45fd4090cbd400d3bba22b3a0c0e86eeb5a33a2
SHA256c2d40742e5b8f638e1ff624de41df72ec5481e75623255559dd6d733d05ea0ca
SHA512c6f2f192302c4d031b74e7d6ab6e34e21eb0d3c2d5845ab92ebc926a917397996b22010ab270f54e1b017ab2b07e982a8849209d8d6a63f1dd2c76bfa6a388c4
-
Filesize
512KB
MD5b5a7957fcaf869f3e736a7ee9b10b960
SHA13cdfc83ccc72dda8ac777462aa1676a19536b2fb
SHA2568ba6f778db22ddde0f4a2d282abfd1029a6af438e86dc1ead9ba768c40aa9ace
SHA512e12221400c4a8b0b3c64a1e6e4c7efe1d109a36c689ff1dfc91217d6a4c2153242d10daf55308158ca17356480835041e700f326f7b67ed91e7d0a87eb1a1387