Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe
-
Size
512KB
-
MD5
6d716201c7e6ef7e37b8c2ad787b545e
-
SHA1
eac84117fe480aafd5ea040868ec51dbeb4cb457
-
SHA256
3eea2b9e75ec223dc8037a6809e487f77a15fd97a8c0213bfa6545a5a47c26bb
-
SHA512
12c4de2fdf357e7ff184bb2c29907b16e680fb7471f88579c446797551e555c78a743260eedf58ef1a1ff93c0371e79f1c5570ab4b196387a6839bc8bf16ff11
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Q
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
lfbwuqvkbs.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lfbwuqvkbs.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
lfbwuqvkbs.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lfbwuqvkbs.exe -
Processes:
lfbwuqvkbs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" lfbwuqvkbs.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
lfbwuqvkbs.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lfbwuqvkbs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
lfbwuqvkbs.exeulvoqlrtrzqlvjz.exebbxfpbte.exeuhsosyrthyykx.exebbxfpbte.exepid process 964 lfbwuqvkbs.exe 3980 ulvoqlrtrzqlvjz.exe 2996 bbxfpbte.exe 2540 uhsosyrthyykx.exe 4008 bbxfpbte.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
lfbwuqvkbs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lfbwuqvkbs.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ulvoqlrtrzqlvjz.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "uhsosyrthyykx.exe" ulvoqlrtrzqlvjz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jrzgsdrf = "lfbwuqvkbs.exe" ulvoqlrtrzqlvjz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uzqzloez = "ulvoqlrtrzqlvjz.exe" ulvoqlrtrzqlvjz.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
bbxfpbte.exelfbwuqvkbs.exebbxfpbte.exedescription ioc process File opened (read-only) \??\m: bbxfpbte.exe File opened (read-only) \??\u: bbxfpbte.exe File opened (read-only) \??\y: bbxfpbte.exe File opened (read-only) \??\j: lfbwuqvkbs.exe File opened (read-only) \??\x: lfbwuqvkbs.exe File opened (read-only) \??\u: bbxfpbte.exe File opened (read-only) \??\a: bbxfpbte.exe File opened (read-only) \??\g: lfbwuqvkbs.exe File opened (read-only) \??\q: lfbwuqvkbs.exe File opened (read-only) \??\o: bbxfpbte.exe File opened (read-only) \??\e: lfbwuqvkbs.exe File opened (read-only) \??\k: bbxfpbte.exe File opened (read-only) \??\y: bbxfpbte.exe File opened (read-only) \??\g: bbxfpbte.exe File opened (read-only) \??\h: bbxfpbte.exe File opened (read-only) \??\q: bbxfpbte.exe File opened (read-only) \??\v: bbxfpbte.exe File opened (read-only) \??\r: lfbwuqvkbs.exe File opened (read-only) \??\g: bbxfpbte.exe File opened (read-only) \??\j: bbxfpbte.exe File opened (read-only) \??\n: bbxfpbte.exe File opened (read-only) \??\z: bbxfpbte.exe File opened (read-only) \??\v: lfbwuqvkbs.exe File opened (read-only) \??\o: lfbwuqvkbs.exe File opened (read-only) \??\k: bbxfpbte.exe File opened (read-only) \??\v: bbxfpbte.exe File opened (read-only) \??\t: bbxfpbte.exe File opened (read-only) \??\z: bbxfpbte.exe File opened (read-only) \??\b: bbxfpbte.exe File opened (read-only) \??\i: bbxfpbte.exe File opened (read-only) \??\t: bbxfpbte.exe File opened (read-only) \??\o: bbxfpbte.exe File opened (read-only) \??\a: bbxfpbte.exe File opened (read-only) \??\t: lfbwuqvkbs.exe File opened (read-only) \??\w: lfbwuqvkbs.exe File opened (read-only) \??\i: bbxfpbte.exe File opened (read-only) \??\n: bbxfpbte.exe File opened (read-only) \??\w: bbxfpbte.exe File opened (read-only) \??\w: bbxfpbte.exe File opened (read-only) \??\z: lfbwuqvkbs.exe File opened (read-only) \??\p: bbxfpbte.exe File opened (read-only) \??\b: lfbwuqvkbs.exe File opened (read-only) \??\l: lfbwuqvkbs.exe File opened (read-only) \??\n: lfbwuqvkbs.exe File opened (read-only) \??\s: lfbwuqvkbs.exe File opened (read-only) \??\m: bbxfpbte.exe File opened (read-only) \??\s: bbxfpbte.exe File opened (read-only) \??\j: bbxfpbte.exe File opened (read-only) \??\l: bbxfpbte.exe File opened (read-only) \??\p: bbxfpbte.exe File opened (read-only) \??\r: bbxfpbte.exe File opened (read-only) \??\a: lfbwuqvkbs.exe File opened (read-only) \??\k: lfbwuqvkbs.exe File opened (read-only) \??\e: bbxfpbte.exe File opened (read-only) \??\h: bbxfpbte.exe File opened (read-only) \??\q: bbxfpbte.exe File opened (read-only) \??\r: bbxfpbte.exe File opened (read-only) \??\l: bbxfpbte.exe File opened (read-only) \??\s: bbxfpbte.exe File opened (read-only) \??\x: bbxfpbte.exe File opened (read-only) \??\m: lfbwuqvkbs.exe File opened (read-only) \??\y: lfbwuqvkbs.exe File opened (read-only) \??\b: bbxfpbte.exe File opened (read-only) \??\x: bbxfpbte.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
lfbwuqvkbs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" lfbwuqvkbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" lfbwuqvkbs.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1160-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ulvoqlrtrzqlvjz.exe autoit_exe C:\Windows\SysWOW64\lfbwuqvkbs.exe autoit_exe C:\Windows\SysWOW64\uhsosyrthyykx.exe autoit_exe C:\Windows\SysWOW64\bbxfpbte.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\MountUnpublish.doc.exe autoit_exe C:\Program Files\TestDebug.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
bbxfpbte.exe6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exebbxfpbte.exelfbwuqvkbs.exedescription ioc process File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbxfpbte.exe File created C:\Windows\SysWOW64\uhsosyrthyykx.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lfbwuqvkbs.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification C:\Windows\SysWOW64\ulvoqlrtrzqlvjz.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File created C:\Windows\SysWOW64\bbxfpbte.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File created C:\Windows\SysWOW64\lfbwuqvkbs.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bbxfpbte.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uhsosyrthyykx.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification C:\Windows\SysWOW64\lfbwuqvkbs.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File created C:\Windows\SysWOW64\ulvoqlrtrzqlvjz.exe 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe -
Drops file in Program Files directory 28 IoCs
Processes:
bbxfpbte.exebbxfpbte.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal bbxfpbte.exe File opened for modification C:\Program Files\MountUnpublish.doc.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\MountUnpublish.doc.exe bbxfpbte.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\TestDebug.doc.exe bbxfpbte.exe File opened for modification C:\Program Files\TestDebug.nal bbxfpbte.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbxfpbte.exe File opened for modification C:\Program Files\MountUnpublish.nal bbxfpbte.exe File opened for modification C:\Program Files\TestDebug.nal bbxfpbte.exe File created \??\c:\Program Files\TestDebug.doc.exe bbxfpbte.exe File opened for modification C:\Program Files\TestDebug.doc.exe bbxfpbte.exe File opened for modification C:\Program Files\TestDebug.doc.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbxfpbte.exe File created \??\c:\Program Files\MountUnpublish.doc.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\MountUnpublish.doc.exe bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbxfpbte.exe File opened for modification C:\Program Files\MountUnpublish.nal bbxfpbte.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbxfpbte.exe File opened for modification C:\Program Files\MountUnpublish.doc.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\TestDebug.doc.exe bbxfpbte.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbxfpbte.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbxfpbte.exe -
Drops file in Windows directory 19 IoCs
Processes:
bbxfpbte.exebbxfpbte.exe6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exeWINWORD.EXEdescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification C:\Windows\mydoc.rtf 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbxfpbte.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbxfpbte.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbxfpbte.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exelfbwuqvkbs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C77B14E3DBB1B8C87C90EDE237BC" 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg lfbwuqvkbs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334F2C7E9C5282586D4277D177202CAE7DF565DA" 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB2B12844E6399D52CEBAD033EAD7B8" 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF4FF8F4F5A851E9042D62E7E97BC90E1435837664E6335D69C" 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf lfbwuqvkbs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lfbwuqvkbs.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" lfbwuqvkbs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" lfbwuqvkbs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lfbwuqvkbs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh lfbwuqvkbs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc lfbwuqvkbs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs lfbwuqvkbs.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCFFAB8FE6BF196840E3B3681993E95B38D03FE4269034CE2C842EA09A0" 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat lfbwuqvkbs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78068B7FF6E21DFD173D0D18B7B9117" 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" lfbwuqvkbs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lfbwuqvkbs.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2720 WINWORD.EXE 2720 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exeuhsosyrthyykx.exeulvoqlrtrzqlvjz.exelfbwuqvkbs.exebbxfpbte.exebbxfpbte.exepid process 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 2996 bbxfpbte.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exeuhsosyrthyykx.exeulvoqlrtrzqlvjz.exelfbwuqvkbs.exebbxfpbte.exebbxfpbte.exepid process 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 2540 uhsosyrthyykx.exe 3980 ulvoqlrtrzqlvjz.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exeuhsosyrthyykx.exeulvoqlrtrzqlvjz.exelfbwuqvkbs.exebbxfpbte.exebbxfpbte.exepid process 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe 2540 uhsosyrthyykx.exe 3980 ulvoqlrtrzqlvjz.exe 2540 uhsosyrthyykx.exe 2540 uhsosyrthyykx.exe 3980 ulvoqlrtrzqlvjz.exe 3980 ulvoqlrtrzqlvjz.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 964 lfbwuqvkbs.exe 2996 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe 4008 bbxfpbte.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2720 WINWORD.EXE 2720 WINWORD.EXE 2720 WINWORD.EXE 2720 WINWORD.EXE 2720 WINWORD.EXE 2720 WINWORD.EXE 2720 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exelfbwuqvkbs.exedescription pid process target process PID 1160 wrote to memory of 964 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe lfbwuqvkbs.exe PID 1160 wrote to memory of 964 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe lfbwuqvkbs.exe PID 1160 wrote to memory of 964 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe lfbwuqvkbs.exe PID 1160 wrote to memory of 3980 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe ulvoqlrtrzqlvjz.exe PID 1160 wrote to memory of 3980 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe ulvoqlrtrzqlvjz.exe PID 1160 wrote to memory of 3980 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe ulvoqlrtrzqlvjz.exe PID 1160 wrote to memory of 2996 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe bbxfpbte.exe PID 1160 wrote to memory of 2996 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe bbxfpbte.exe PID 1160 wrote to memory of 2996 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe bbxfpbte.exe PID 1160 wrote to memory of 2540 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe uhsosyrthyykx.exe PID 1160 wrote to memory of 2540 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe uhsosyrthyykx.exe PID 1160 wrote to memory of 2540 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe uhsosyrthyykx.exe PID 1160 wrote to memory of 2720 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe WINWORD.EXE PID 1160 wrote to memory of 2720 1160 6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe WINWORD.EXE PID 964 wrote to memory of 4008 964 lfbwuqvkbs.exe bbxfpbte.exe PID 964 wrote to memory of 4008 964 lfbwuqvkbs.exe bbxfpbte.exe PID 964 wrote to memory of 4008 964 lfbwuqvkbs.exe bbxfpbte.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d716201c7e6ef7e37b8c2ad787b545e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\lfbwuqvkbs.exelfbwuqvkbs.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\bbxfpbte.exeC:\Windows\system32\bbxfpbte.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4008
-
-
-
C:\Windows\SysWOW64\ulvoqlrtrzqlvjz.exeulvoqlrtrzqlvjz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3980
-
-
C:\Windows\SysWOW64\bbxfpbte.exebbxfpbte.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2996
-
-
C:\Windows\SysWOW64\uhsosyrthyykx.exeuhsosyrthyykx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2540
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5e7958e518e803add3b8d2f9b01a0482a
SHA1f85fb1231abe2a7ec50c758a932afb407de81362
SHA256f5e3e2c4dabbfa5afbc0084fa0e6c5258a5e6267fe72c2ee3fcee2f3f9706fd6
SHA512a5447cdf300ab3ee06a7b540a60fdb09b48d7095e97655a2d960511f45e0f732ad138460369550553c6c89f4f782054865ee0823e5fa8a748ecf410ff8f08f7b
-
Filesize
512KB
MD5468b3ba87692a403cd3ebd62fd6d096f
SHA16651db417f8302e788f34fae1c5d9941c45e4170
SHA25682f3a2063020780882905045c94e5bc5d3093f8e553218f12992856844eef2db
SHA5122d2be5c2727541d07d40e6bd501dc3039d3161c196b20ca48ad34f265eac3175655476cf5072fd3a4212c411fbc40cc37bc6f60bf72414645743f7c2a6358ad8
-
Filesize
512KB
MD542a18c551f403e9aea25ef07565057b0
SHA157974dc8417a533c854353bc428c79443ac26e17
SHA2561664f0835d2c5bacce361c6c886f9c4b53421226b7057d13c2ae1645107f56fc
SHA512f42609a2a9cc6a0445c76ca447218cb010efa0397863fac6947d81fc6ebce611ead6c79a337f968c42eed2ae8c53481528cd3320137150e1e111ca50a927e579
-
Filesize
512KB
MD5556bde865075255476c955463a6d7163
SHA1925a7e03c6522a2884469f89ff60ba200fa1bfad
SHA2560a262506369d58163d75f8a10eccabdae0cd01f193ca54cd5d28269905cba8b2
SHA512d7f958f9a82a3d7ef80c396f79dc353ccf946e4f35b878b03d4c6f0687f526fb86a021772a25f59771603900869680de65608f2605dbac24158bf252765150af
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
239B
MD5955cfba83c355f3f6ad29e889ef145f4
SHA1e0af6190ffa9db812ff91cd876ebe4e124cd0d7e
SHA256e7c59d033ba6a5ea308e7d7251d7a73b4446637dfe25e212a74b02f0f97879f0
SHA51252e3b919ff075b11fab36855bf9bcb5f3756c4602267ad61c8d46de20c8cf458b54bf638afe1c1b4b7503d6cc18ab32acd200d455144a2bef45fddd4b7d5a5fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5cd78a8a19a8e82396c9ad49e4aba1ee0
SHA197333d17b735a0a38c2e488a1eed1415444e6f59
SHA2567b082ab187ac201a7fe94ea68773a899b34f46e51f07d4a8528440ac23f21abc
SHA512e6633c7f64c279c4bf4b3eecfd653a195b23775502ad02e4c0ce2853b033655c7ff957440bd86c73ec1008daf22e8f814622b62b301bcaffa3a34a046d85eaac
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5dfbb6fa9b6d139e251dfefa35db87dbd
SHA106e731071e9c852fa0075f5a528744fbdc779388
SHA2562b2ce1cc25696dbf21ad8764b3d3eb93f9b21a21a4ca62ad58c44ab73b042f2f
SHA512a1122bed86c01d8a21b27c80f0f8ec7895cae76ae1310874d05514b87b693946349ca465e12fbd95ca46c2c626946f0ccfabddcbd75be5709e204a50f543c839
-
Filesize
512KB
MD5dd8a7f5fc93e16a919e2c24e2f2afce9
SHA1610616fe33669816c05557cf0f5193f0dfb32495
SHA25675a1d4d24ec8c9e0e0d428545d910b0b93b5c5222a8941f4012bc659fdf4bff8
SHA512bb03a2a7133f667c81c905886a51ddf89a86a2d8c0daeb37541552d404725113b1b9d48e153a162a6e96c4b3102aabf7890f25ae17ec86a0b35b14471b320981
-
Filesize
512KB
MD5db087a746b271775842253fcf4c224ac
SHA1b3737019ab0db16a432222a6e5949570e7a1a0bd
SHA2567a6073ff3603b9deee9dd3be629d7af1dcd121214a0e2b58181cbe87b88938a6
SHA512fa6d62edc0ac3f776a8781c8b3a99475fcabfea84fb81656c245c021153df7e959653edddf0de827e3018b2dbae45cc377568cd93dc68deabafd7384c52d6341
-
Filesize
512KB
MD57ad645a32567f2f2d30f4563c6ce324a
SHA199da0d0b0b5944c523ba33c1c372facc34b9cffc
SHA25694909d6939fa73f701f8342630a028e4e5d1ed0afcd3a4ddbb3c32ca46dbf7c8
SHA512bd1d00fe0a52b99bea2844572a9da753e636f94edbd58d8a3311d4ad620c5c3384e8ce172afb8884ae610137d51ab92d0183fe90ca5af592ff54dd2b760d6b35
-
Filesize
512KB
MD542d80c6f3570fe1f3265fa29cd335995
SHA16c4e1d5c97bb91585f2252887e46b1faec466495
SHA2565825855a976833c3229bf379cbfa2b90d136e9c144923d7e7646b3bab39108e2
SHA512920d61739c6860d1ec0469976412141e01b9dee1507b860a606fe4cbc58ad4d9ecca20e35976426112207ee94fe6d930c47b04157f7fabd9aab16912c44320b2
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD57823d7a6a7a6b14f8b8cfa482d34f54d
SHA1b1129d9e074d4471579ba6053cbf8290613f1116
SHA256ece99f5f2efaeba2ba84d203adec062adc2126f4e5c4501d5f50f8219f11cb0b
SHA5122717b1407cb5e5a5d96b3d7452f09c24f0a67925cb7855bb6595953463752d81fb18a5ac874992171e3f97723ed46d98576b45e0213b2cd6585b237b1fcaa0e0
-
Filesize
512KB
MD584c8777f6fa33d6e60a9f1853b5f58de
SHA1a76dcb45af72d1bdffbc20cb06107a0df5d07866
SHA256e52b95953314c7ba4c9a2d0c30441459f1788f82dc85d4e63d9f3170d8ebc238
SHA512f067b54704c873a350ca9953a31135600c813de476f16e8feca588c59dca6445b01cfc2a2598847567c778d996ddea13415de6255d2b92d730b5aa8b6d65f689