Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 06:17

General

  • Target

    6a02ab31f7a70f5877b70074bdd17bd9_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    6a02ab31f7a70f5877b70074bdd17bd9

  • SHA1

    2f7fab74ef473167bbbd8abb911be5045fb873e4

  • SHA256

    94545f12bdc0240b6f76320d6fd0a004020d49e229399e4a6254951b76c83eba

  • SHA512

    73b7f5e0dcf918ee45a0d3665445c27e6d7137b886122089d79ffe615a889707864269b814eaff470d5fda54e4d14e6ea9f2dad33c8be1a8c36e6bcd97450843

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6f:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm58

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a02ab31f7a70f5877b70074bdd17bd9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6a02ab31f7a70f5877b70074bdd17bd9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\qzcishhlky.exe
      qzcishhlky.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\imsrcyov.exe
        C:\Windows\system32\imsrcyov.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2828
    • C:\Windows\SysWOW64\cxiuayepdruthrd.exe
      cxiuayepdruthrd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c oyizjossonwsr.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\SysWOW64\oyizjossonwsr.exe
          oyizjossonwsr.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2572
    • C:\Windows\SysWOW64\imsrcyov.exe
      imsrcyov.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2600
    • C:\Windows\SysWOW64\oyizjossonwsr.exe
      oyizjossonwsr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2920

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    7
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      5532b77b025363074576fb2f58716545

      SHA1

      3063097c6dc5f7332d010cd0bb72494c67fb53f5

      SHA256

      9cae04e70c570c18d9ce6539e99ae45d3b80a1ddbc14ace0f2230d02cb5394fe

      SHA512

      8344f8e4143f9e7b395aa10b787aab112653a77fe0c4fc174b1daa9603dc826e9fe2cbc4b0eee526293b4803f748842cbf040f56d76cbf1966cd79549a4d27c6

    • C:\Windows\SysWOW64\cxiuayepdruthrd.exe
      Filesize

      512KB

      MD5

      39d20469a0ea4d2a5e62b2513f88975e

      SHA1

      557c0f131ad8ecca54592cb56a8cc3f653148e24

      SHA256

      7fbb083a976e91f684a93a9c50a80a65e525e7a92f93d660b85b59619c82d096

      SHA512

      d4bbff62575a22e9dd7c67777ef37ae380f613b08be294d9fdcc70ae6146fae5e27b5eebf2f576f8d4c42ccb3e6e7204fa1765aeac76cf4d5d12a5978925f2d4

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\imsrcyov.exe
      Filesize

      512KB

      MD5

      fdcf4d05344484ced8940d4b2030de21

      SHA1

      ca12fcfd465a7f91b74236b3f09b4ecbc06b7adc

      SHA256

      34912380c122ddfc0ff1bf612d4df833d95d59ced7b50273b939f59953a97ff4

      SHA512

      b49355a020e866f2e5b3c0e4deae824239834250aa304fdec78692d7c2f1521d2c6bfa7f9dafb751711f8428a83d4077a86eb4d570cae2fde87e4fd70de6df11

    • \Windows\SysWOW64\oyizjossonwsr.exe
      Filesize

      512KB

      MD5

      c9744bc251e582740f1f58331beb8121

      SHA1

      9274a6f4f6ff1b8d5df0e2588e75d81017bb33a8

      SHA256

      12487df6917dc3fe110c612e1aa9cf3ad30670b36ba1163badbdef5a1678a806

      SHA512

      ab17a1d9079579410d1da9eb63c501b9b8cb1b6087988b3ced03d14e6894fbf95d2ddaa5e6053d66ee3ce8a0d9c115a6cbc107908191aec57005bd8e1cc8c267

    • \Windows\SysWOW64\qzcishhlky.exe
      Filesize

      512KB

      MD5

      459f2fc3f2b9a5775c11e330846c926f

      SHA1

      7d7de5b4b8524f04614c876912ca3b6a9cbad48a

      SHA256

      cf8eb4ca64ed63d3b577fe5e299c3e0696d498258dad8bdfec89ddd32e603d84

      SHA512

      ddc5706db65368ec0976db19d6c3093d0d6739831dbf5259c316b00be60c98b83aacfa871bd23cb32027a9f807d80868227351bf9be9b47897f89b019ac873c5

    • memory/2464-48-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2464-95-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2784-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB