Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe
-
Size
512KB
-
MD5
69fa6d2c84ebb60bca0f2ead22791a56
-
SHA1
f62244dbc62d31e527453e8a1f3839ab71eedb7f
-
SHA256
529c487ecc8450a4fc69830d8b0ce75eaf2ef15b6a454801b0e7665bb9221b34
-
SHA512
4d616eec89b4db3c6438b5fd0d3801b427ed40484a05669ab7b3a036024c72c71dfcf816f409dac89eee5bc96613a3415ce4c6717fe0ddf36a73277ef858a93f
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5b
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
qpuevkposy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qpuevkposy.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
qpuevkposy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qpuevkposy.exe -
Processes:
qpuevkposy.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qpuevkposy.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
qpuevkposy.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qpuevkposy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
qpuevkposy.exefyeyogwzxjnuwdy.execfkzeeuy.exedaqjztapyarjd.execfkzeeuy.exepid process 724 qpuevkposy.exe 4516 fyeyogwzxjnuwdy.exe 228 cfkzeeuy.exe 2024 daqjztapyarjd.exe 4948 cfkzeeuy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
qpuevkposy.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qpuevkposy.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
fyeyogwzxjnuwdy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lnmoslzi = "fyeyogwzxjnuwdy.exe" fyeyogwzxjnuwdy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "daqjztapyarjd.exe" fyeyogwzxjnuwdy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kuzuynfw = "qpuevkposy.exe" fyeyogwzxjnuwdy.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cfkzeeuy.execfkzeeuy.exeqpuevkposy.exedescription ioc process File opened (read-only) \??\b: cfkzeeuy.exe File opened (read-only) \??\p: cfkzeeuy.exe File opened (read-only) \??\t: cfkzeeuy.exe File opened (read-only) \??\q: cfkzeeuy.exe File opened (read-only) \??\p: cfkzeeuy.exe File opened (read-only) \??\k: cfkzeeuy.exe File opened (read-only) \??\m: cfkzeeuy.exe File opened (read-only) \??\n: cfkzeeuy.exe File opened (read-only) \??\v: cfkzeeuy.exe File opened (read-only) \??\x: cfkzeeuy.exe File opened (read-only) \??\y: cfkzeeuy.exe File opened (read-only) \??\t: qpuevkposy.exe File opened (read-only) \??\a: cfkzeeuy.exe File opened (read-only) \??\i: cfkzeeuy.exe File opened (read-only) \??\g: qpuevkposy.exe File opened (read-only) \??\h: qpuevkposy.exe File opened (read-only) \??\r: qpuevkposy.exe File opened (read-only) \??\x: qpuevkposy.exe File opened (read-only) \??\h: cfkzeeuy.exe File opened (read-only) \??\w: cfkzeeuy.exe File opened (read-only) \??\x: cfkzeeuy.exe File opened (read-only) \??\z: cfkzeeuy.exe File opened (read-only) \??\b: qpuevkposy.exe File opened (read-only) \??\p: qpuevkposy.exe File opened (read-only) \??\s: qpuevkposy.exe File opened (read-only) \??\g: cfkzeeuy.exe File opened (read-only) \??\o: cfkzeeuy.exe File opened (read-only) \??\u: cfkzeeuy.exe File opened (read-only) \??\a: qpuevkposy.exe File opened (read-only) \??\q: qpuevkposy.exe File opened (read-only) \??\a: cfkzeeuy.exe File opened (read-only) \??\g: cfkzeeuy.exe File opened (read-only) \??\k: cfkzeeuy.exe File opened (read-only) \??\n: cfkzeeuy.exe File opened (read-only) \??\z: cfkzeeuy.exe File opened (read-only) \??\l: cfkzeeuy.exe File opened (read-only) \??\s: cfkzeeuy.exe File opened (read-only) \??\w: cfkzeeuy.exe File opened (read-only) \??\u: qpuevkposy.exe File opened (read-only) \??\v: qpuevkposy.exe File opened (read-only) \??\y: qpuevkposy.exe File opened (read-only) \??\z: qpuevkposy.exe File opened (read-only) \??\q: cfkzeeuy.exe File opened (read-only) \??\i: cfkzeeuy.exe File opened (read-only) \??\e: cfkzeeuy.exe File opened (read-only) \??\j: qpuevkposy.exe File opened (read-only) \??\l: qpuevkposy.exe File opened (read-only) \??\m: cfkzeeuy.exe File opened (read-only) \??\b: cfkzeeuy.exe File opened (read-only) \??\e: qpuevkposy.exe File opened (read-only) \??\e: cfkzeeuy.exe File opened (read-only) \??\u: cfkzeeuy.exe File opened (read-only) \??\r: cfkzeeuy.exe File opened (read-only) \??\j: cfkzeeuy.exe File opened (read-only) \??\k: qpuevkposy.exe File opened (read-only) \??\h: cfkzeeuy.exe File opened (read-only) \??\v: cfkzeeuy.exe File opened (read-only) \??\y: cfkzeeuy.exe File opened (read-only) \??\o: qpuevkposy.exe File opened (read-only) \??\w: qpuevkposy.exe File opened (read-only) \??\j: cfkzeeuy.exe File opened (read-only) \??\n: qpuevkposy.exe File opened (read-only) \??\m: qpuevkposy.exe File opened (read-only) \??\r: cfkzeeuy.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
qpuevkposy.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" qpuevkposy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" qpuevkposy.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4024-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\fyeyogwzxjnuwdy.exe autoit_exe C:\Windows\SysWOW64\cfkzeeuy.exe autoit_exe C:\Windows\SysWOW64\daqjztapyarjd.exe autoit_exe C:\Windows\SysWOW64\qpuevkposy.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Users\Admin\Documents\RepairEdit.doc.exe autoit_exe C:\Users\Admin\Music\StartRevoke.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeqpuevkposy.execfkzeeuy.execfkzeeuy.exedescription ioc process File created C:\Windows\SysWOW64\cfkzeeuy.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qpuevkposy.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe cfkzeeuy.exe File created C:\Windows\SysWOW64\qpuevkposy.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qpuevkposy.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File created C:\Windows\SysWOW64\fyeyogwzxjnuwdy.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\daqjztapyarjd.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification C:\Windows\SysWOW64\fyeyogwzxjnuwdy.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cfkzeeuy.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File created C:\Windows\SysWOW64\daqjztapyarjd.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
cfkzeeuy.execfkzeeuy.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cfkzeeuy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cfkzeeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cfkzeeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cfkzeeuy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cfkzeeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cfkzeeuy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal cfkzeeuy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal cfkzeeuy.exe -
Drops file in Windows directory 19 IoCs
Processes:
WINWORD.EXEcfkzeeuy.execfkzeeuy.exe69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification C:\Windows\mydoc.rtf 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe cfkzeeuy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe cfkzeeuy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe cfkzeeuy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeqpuevkposy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC67F1594DAB4B9BE7CE8EC9434B9" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" qpuevkposy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qpuevkposy.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qpuevkposy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" qpuevkposy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc qpuevkposy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACAF9BDF913F290837F3B46819C3EE2B3FE02FE4366023CE2C9429D09A3" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB1B12C47E538E853CBBAD733E9D4CF" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF5FFF94F58851B9032D6587D94BC94E640594666456334D790" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78368B0FF6E22DDD179D0A08A7F9014" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" qpuevkposy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32422D789D2C83236D4376A277262CAA7CF665AB" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1848 WINWORD.EXE 1848 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeqpuevkposy.execfkzeeuy.exefyeyogwzxjnuwdy.exedaqjztapyarjd.execfkzeeuy.exepid process 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeqpuevkposy.execfkzeeuy.exefyeyogwzxjnuwdy.exedaqjztapyarjd.execfkzeeuy.exepid process 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeqpuevkposy.execfkzeeuy.exefyeyogwzxjnuwdy.exedaqjztapyarjd.execfkzeeuy.exepid process 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 724 qpuevkposy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 228 cfkzeeuy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 4516 fyeyogwzxjnuwdy.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 2024 daqjztapyarjd.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe 4948 cfkzeeuy.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeqpuevkposy.exedescription pid process target process PID 4024 wrote to memory of 724 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qpuevkposy.exe PID 4024 wrote to memory of 724 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qpuevkposy.exe PID 4024 wrote to memory of 724 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qpuevkposy.exe PID 4024 wrote to memory of 4516 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe fyeyogwzxjnuwdy.exe PID 4024 wrote to memory of 4516 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe fyeyogwzxjnuwdy.exe PID 4024 wrote to memory of 4516 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe fyeyogwzxjnuwdy.exe PID 4024 wrote to memory of 228 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe cfkzeeuy.exe PID 4024 wrote to memory of 228 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe cfkzeeuy.exe PID 4024 wrote to memory of 228 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe cfkzeeuy.exe PID 4024 wrote to memory of 2024 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe daqjztapyarjd.exe PID 4024 wrote to memory of 2024 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe daqjztapyarjd.exe PID 4024 wrote to memory of 2024 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe daqjztapyarjd.exe PID 4024 wrote to memory of 1848 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe WINWORD.EXE PID 4024 wrote to memory of 1848 4024 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe WINWORD.EXE PID 724 wrote to memory of 4948 724 qpuevkposy.exe cfkzeeuy.exe PID 724 wrote to memory of 4948 724 qpuevkposy.exe cfkzeeuy.exe PID 724 wrote to memory of 4948 724 qpuevkposy.exe cfkzeeuy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\qpuevkposy.exeqpuevkposy.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\cfkzeeuy.exeC:\Windows\system32\cfkzeeuy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4948 -
C:\Windows\SysWOW64\fyeyogwzxjnuwdy.exefyeyogwzxjnuwdy.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4516 -
C:\Windows\SysWOW64\cfkzeeuy.execfkzeeuy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:228 -
C:\Windows\SysWOW64\daqjztapyarjd.exedaqjztapyarjd.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2024 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5b7c3e5d74af46a6532b48a957ef12d97
SHA1d957929131fd5be68ca40c37bf9786496e965886
SHA256fee6dee7716fda3ea4584a3a74f71095c1b9f04a2f44c2d4c1448c9e6f910ccc
SHA512dbc6f30bcd9bb9b8a71a0aeacd92c049480bc26c08a5c2b1bfa9d12c7abca60d20cc45d246ed97d7bedf7cd495caad0e193d9d8fd86f4303c1c0a2b49bd0a93b
-
Filesize
512KB
MD56f8be3590e3771a044b4ecc829641cc5
SHA1955032eb7efc6f78da5ad790ecd5cece23babeb0
SHA256cdf46171b223ee25a831780a05fdb663b8d2fa3b143cfaafc2d6650b5790c019
SHA512495667415282cc3a33af5cb1b81dad537e9e8045821dc7b6d2f957e316d0b9f4c0860d915a267291342b289dd6a133a36a4b83dc20b844a5319e3b442e134843
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5ba0ecff8e84b75d484683a1df4004d50
SHA1e428c1858492a000babc46a56171507f50ee6ef3
SHA2569d41ab09cf15bfdf53a15c7a91233389d4d02961dc5e794efb0985c37d10fd9f
SHA512739aadf30dcda0dc6c70941f4859b5af549324f3dac02f765c5661482c190098e0011e7f3143fff0df73d0513bbd084e4cd94566c83503171e35d27e8997a864
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5f728654f54af32053e5bf998bad41738
SHA1a74b298e80dcbd78a1e667766cf8848bcb55763b
SHA256967e3e8c3c6ad3e169019c1f25e048bf1c908fbd0abfb085fc864c33348a0176
SHA512077844bef2f2160661206dec3486f3f87c681abc429dedd34a1b67799fab5344bc4136e74d8341437f37780100d4afa57b8f8bbfe0b3449ca4f36a6728ace2bf
-
Filesize
512KB
MD5e30344be32f0d205dcb47aa9f705961b
SHA155fcf324be8ea2607abbd063a223efd0a0d64e72
SHA25644c6237ca281c90b92fef8f346151533cd1bdd9814dde4632dc8512ccec0e238
SHA512f34dc6f59a90f3a484f57c39ad801a25017db1a3c1dd3c5291b2c6099649b318d05ba42fcf6b07d10bed7fe0e4b5fbfd6836351ba68fe42f709914ee51cf97ed
-
Filesize
512KB
MD53da53172481574c4587231b5ba4bfefa
SHA1cbf35c66fad8d33345df7bc04ce365cbe23953d7
SHA256dd1b2e451a7e2ef825cb86f90918e332099026584d14629169adb9fd7644dcde
SHA51282d4f0d00b38f3203fe8c60eb0ef2b56c6093ffdff602b43d415dbb1c570c2d549d8b6eeccba68aa67849a73791ef5a58bbbec52bb6c5a776c4e7ecdcc6347d4
-
Filesize
512KB
MD5a83d6f5ab995314b0446a424f3520e2f
SHA1212d8597ca5ca421630d146f6d23505f6dead08c
SHA2561ac6e24005d4b7a26f754ddb6362f4e14f7a68d76b3ad77bab1d9a0f1aedceae
SHA51278cbf75e7fa2211f53c0d9a793435ac360dae054e89e1da6c909d3cdf4bea96e1e1a0fe7ed77fb035ca59638e3228ca6a76cff15d76c86ed0571741c7bd9f5b6
-
Filesize
512KB
MD5b5e1b501bfed1df17055176703585b95
SHA14e596b74f8cf42882e71989bc86eade717b8da60
SHA2567621d60ffafb42123df1b0816192a647ecd77ef226964a48562daf941ce4eafa
SHA512dc662d9e7f9b849b0b79a025740fda8f4156e8b89206ecacba0e842f6650334c59c220faad0bb7dbdbb99091bc8ff9988b78586bd785bee5a1e72ff980f559de
-
Filesize
512KB
MD55cb9fa78582b933379f0ade43a1626d3
SHA1124bb22e7000803b026b5d9cddc53bcd52dc3c3a
SHA256edbfbe238337d52b173e4a1f98b7de705ef05ef732debd8f57f952424b8c5fbe
SHA512769064b74930b324c5e0ca961582554130bd23b879a22cf703794650b82b94e723e923a420c869e3e5845d93705d094a47d6df064ef32f3e07c1cf9c2e0369ee
-
Filesize
512KB
MD5eaa382bd2e4171370009aeb256d56401
SHA1ce2799581a404a377ae1bcdf35c03c969639720f
SHA25695d9be0fe4e9660544dc8b419819138fd742e977147576d8917193c645d20c0a
SHA512bdabb0a3d1140fe49ac2ec4dbcc4c6b8ded2dd1acb2f4419b29693b9d6f3c7765fa3a7843fe4dd0e37c9bee1c0e7789f3c2b20a7e791f5721435e29403a0d4bc
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD520e3e93d6db7d03c8c9d562322f13709
SHA1a526b8585ef300b525811af2dbc5c406686676ef
SHA2561afd209e2af95ebde386b1089e5a002b1bdb0b1e4d3e743e5ab9c53cf0d49fe3
SHA51294855d3bb55b5a837279924bdaf43e91cf7c8dfd3d613f4c2cdba68fe935a5bf17c54588c812aaefe11d3f093933c698be4c80f34d3d378b320edf61c5c3b947
-
Filesize
512KB
MD5655b3b0238571df4b07837fce0234b54
SHA1482e01fb6bee7c3209429eed8736683041a255b2
SHA2565322a057fdb3d85b25f394d00b0d3363aae6911521788f86d9603b4948d9c3f2
SHA512ff033e81633dbd12463c3ff4afbfbe14d2681b071aca19ac69d35da3095803085472f2305a6a80d3d8abe388a24213fe09d35975c38ca6d76486a6a0b796d857
-
Filesize
512KB
MD514aff64439502f8f535974fb104c08a8
SHA1cc09e9aa799e1e62a70b272a0ad42542b48b4a56
SHA256d01a18b2986743dfe4fc1144188421a4e828f31bd99e32158d2a11f25dad19dd
SHA5120d84d9d13f0381e66ccda1f1b9bad33e668a39f3e980d243e4bce615bffdf6467c6c9570a704983a0f52a27cbbb3e4209b3477efd95fc9828e1786d13cc14b4a