Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe
-
Size
512KB
-
MD5
6e5fe8f92ccfe66841b6883f203c7130
-
SHA1
b779fd7d925198648e07891a85ce1d1e74ff0089
-
SHA256
0917c4a242bf23854fdb59c32a0bb139bbd449e8a10133e145b4c7b570f027dd
-
SHA512
4b0b187dc8117adbc6ab68cd828a0c20c9b175cdcde02185e8f0fca801f91bc51596732d4f6f0c33795993602ec3f06eb0b6334c59a65bf088c7cbf4d9084f54
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6T:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5I
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
mytuqzfgnq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" mytuqzfgnq.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
mytuqzfgnq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mytuqzfgnq.exe -
Processes:
mytuqzfgnq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" mytuqzfgnq.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
mytuqzfgnq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" mytuqzfgnq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
mytuqzfgnq.exejempsnxubuvkmnv.exerremjzmz.exeplywslnxnltcv.exerremjzmz.exepid process 1760 mytuqzfgnq.exe 2728 jempsnxubuvkmnv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 5012 rremjzmz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
mytuqzfgnq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" mytuqzfgnq.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
jempsnxubuvkmnv.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sxzpclyv = "mytuqzfgnq.exe" jempsnxubuvkmnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iftqlagt = "jempsnxubuvkmnv.exe" jempsnxubuvkmnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "plywslnxnltcv.exe" jempsnxubuvkmnv.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
mytuqzfgnq.exerremjzmz.exerremjzmz.exedescription ioc process File opened (read-only) \??\l: mytuqzfgnq.exe File opened (read-only) \??\a: rremjzmz.exe File opened (read-only) \??\m: rremjzmz.exe File opened (read-only) \??\e: mytuqzfgnq.exe File opened (read-only) \??\m: mytuqzfgnq.exe File opened (read-only) \??\r: mytuqzfgnq.exe File opened (read-only) \??\q: rremjzmz.exe File opened (read-only) \??\g: rremjzmz.exe File opened (read-only) \??\v: rremjzmz.exe File opened (read-only) \??\t: mytuqzfgnq.exe File opened (read-only) \??\u: mytuqzfgnq.exe File opened (read-only) \??\b: rremjzmz.exe File opened (read-only) \??\l: rremjzmz.exe File opened (read-only) \??\p: rremjzmz.exe File opened (read-only) \??\i: rremjzmz.exe File opened (read-only) \??\y: rremjzmz.exe File opened (read-only) \??\s: mytuqzfgnq.exe File opened (read-only) \??\z: rremjzmz.exe File opened (read-only) \??\h: rremjzmz.exe File opened (read-only) \??\o: rremjzmz.exe File opened (read-only) \??\p: rremjzmz.exe File opened (read-only) \??\x: rremjzmz.exe File opened (read-only) \??\q: rremjzmz.exe File opened (read-only) \??\y: rremjzmz.exe File opened (read-only) \??\l: rremjzmz.exe File opened (read-only) \??\n: rremjzmz.exe File opened (read-only) \??\v: mytuqzfgnq.exe File opened (read-only) \??\x: mytuqzfgnq.exe File opened (read-only) \??\s: rremjzmz.exe File opened (read-only) \??\j: rremjzmz.exe File opened (read-only) \??\o: rremjzmz.exe File opened (read-only) \??\r: rremjzmz.exe File opened (read-only) \??\s: rremjzmz.exe File opened (read-only) \??\j: mytuqzfgnq.exe File opened (read-only) \??\q: mytuqzfgnq.exe File opened (read-only) \??\e: rremjzmz.exe File opened (read-only) \??\h: rremjzmz.exe File opened (read-only) \??\x: rremjzmz.exe File opened (read-only) \??\w: rremjzmz.exe File opened (read-only) \??\h: mytuqzfgnq.exe File opened (read-only) \??\w: mytuqzfgnq.exe File opened (read-only) \??\k: rremjzmz.exe File opened (read-only) \??\t: rremjzmz.exe File opened (read-only) \??\w: rremjzmz.exe File opened (read-only) \??\b: rremjzmz.exe File opened (read-only) \??\e: rremjzmz.exe File opened (read-only) \??\p: mytuqzfgnq.exe File opened (read-only) \??\y: mytuqzfgnq.exe File opened (read-only) \??\z: mytuqzfgnq.exe File opened (read-only) \??\j: rremjzmz.exe File opened (read-only) \??\u: rremjzmz.exe File opened (read-only) \??\b: mytuqzfgnq.exe File opened (read-only) \??\i: mytuqzfgnq.exe File opened (read-only) \??\n: mytuqzfgnq.exe File opened (read-only) \??\o: mytuqzfgnq.exe File opened (read-only) \??\m: rremjzmz.exe File opened (read-only) \??\n: rremjzmz.exe File opened (read-only) \??\r: rremjzmz.exe File opened (read-only) \??\g: mytuqzfgnq.exe File opened (read-only) \??\k: mytuqzfgnq.exe File opened (read-only) \??\a: rremjzmz.exe File opened (read-only) \??\u: rremjzmz.exe File opened (read-only) \??\g: rremjzmz.exe File opened (read-only) \??\a: mytuqzfgnq.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
mytuqzfgnq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" mytuqzfgnq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" mytuqzfgnq.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3936-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\jempsnxubuvkmnv.exe autoit_exe C:\Windows\SysWOW64\mytuqzfgnq.exe autoit_exe C:\Windows\SysWOW64\rremjzmz.exe autoit_exe C:\Windows\SysWOW64\plywslnxnltcv.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
rremjzmz.exe6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exemytuqzfgnq.exerremjzmz.exedescription ioc process File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rremjzmz.exe File created C:\Windows\SysWOW64\mytuqzfgnq.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File created C:\Windows\SysWOW64\jempsnxubuvkmnv.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jempsnxubuvkmnv.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File created C:\Windows\SysWOW64\rremjzmz.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File created C:\Windows\SysWOW64\plywslnxnltcv.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll mytuqzfgnq.exe File opened for modification C:\Windows\SysWOW64\mytuqzfgnq.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rremjzmz.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\plywslnxnltcv.exe 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rremjzmz.exe -
Drops file in Program Files directory 14 IoCs
Processes:
rremjzmz.exerremjzmz.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rremjzmz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal rremjzmz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal rremjzmz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rremjzmz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rremjzmz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rremjzmz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rremjzmz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rremjzmz.exe -
Drops file in Windows directory 19 IoCs
Processes:
rremjzmz.exerremjzmz.exe6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exeWINWORD.EXEdescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification C:\Windows\mydoc.rtf 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rremjzmz.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rremjzmz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rremjzmz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exemytuqzfgnq.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334E2D089D2D82236D4677A170202CD97D8065D8" 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFFAB1F960F29984083B3081EC3E94B08D03F142150332E1BA42EE09D3" 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8EFF8B4F29826F9042D72B7DE2BCE5E13C594B66436346D6E9" 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc mytuqzfgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" mytuqzfgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" mytuqzfgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" mytuqzfgnq.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" mytuqzfgnq.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F268C4FF6E22D8D273D0A28B099017" 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1849C60C14E6DBC5B8C87CE5EDE037CD" 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat mytuqzfgnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh mytuqzfgnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf mytuqzfgnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs mytuqzfgnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg mytuqzfgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB2B028479239EF53C4B9A73298D4CC" 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" mytuqzfgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mytuqzfgnq.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2840 WINWORD.EXE 2840 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exemytuqzfgnq.exejempsnxubuvkmnv.exerremjzmz.exeplywslnxnltcv.exerremjzmz.exepid process 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 4244 plywslnxnltcv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 5012 rremjzmz.exe 5012 rremjzmz.exe 5012 rremjzmz.exe 5012 rremjzmz.exe 5012 rremjzmz.exe 5012 rremjzmz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exemytuqzfgnq.exejempsnxubuvkmnv.exerremjzmz.exeplywslnxnltcv.exerremjzmz.exepid process 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 5012 rremjzmz.exe 5012 rremjzmz.exe 5012 rremjzmz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exemytuqzfgnq.exejempsnxubuvkmnv.exerremjzmz.exeplywslnxnltcv.exerremjzmz.exepid process 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 1760 mytuqzfgnq.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 2728 jempsnxubuvkmnv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 1616 rremjzmz.exe 4244 plywslnxnltcv.exe 5012 rremjzmz.exe 5012 rremjzmz.exe 5012 rremjzmz.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2840 WINWORD.EXE 2840 WINWORD.EXE 2840 WINWORD.EXE 2840 WINWORD.EXE 2840 WINWORD.EXE 2840 WINWORD.EXE 2840 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exemytuqzfgnq.exedescription pid process target process PID 3936 wrote to memory of 1760 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe mytuqzfgnq.exe PID 3936 wrote to memory of 1760 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe mytuqzfgnq.exe PID 3936 wrote to memory of 1760 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe mytuqzfgnq.exe PID 3936 wrote to memory of 2728 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe jempsnxubuvkmnv.exe PID 3936 wrote to memory of 2728 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe jempsnxubuvkmnv.exe PID 3936 wrote to memory of 2728 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe jempsnxubuvkmnv.exe PID 3936 wrote to memory of 1616 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe rremjzmz.exe PID 3936 wrote to memory of 1616 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe rremjzmz.exe PID 3936 wrote to memory of 1616 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe rremjzmz.exe PID 3936 wrote to memory of 4244 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe plywslnxnltcv.exe PID 3936 wrote to memory of 4244 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe plywslnxnltcv.exe PID 3936 wrote to memory of 4244 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe plywslnxnltcv.exe PID 3936 wrote to memory of 2840 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe WINWORD.EXE PID 3936 wrote to memory of 2840 3936 6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe WINWORD.EXE PID 1760 wrote to memory of 5012 1760 mytuqzfgnq.exe rremjzmz.exe PID 1760 wrote to memory of 5012 1760 mytuqzfgnq.exe rremjzmz.exe PID 1760 wrote to memory of 5012 1760 mytuqzfgnq.exe rremjzmz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e5fe8f92ccfe66841b6883f203c7130_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\mytuqzfgnq.exemytuqzfgnq.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rremjzmz.exeC:\Windows\system32\rremjzmz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5012 -
C:\Windows\SysWOW64\jempsnxubuvkmnv.exejempsnxubuvkmnv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2728 -
C:\Windows\SysWOW64\rremjzmz.exerremjzmz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1616 -
C:\Windows\SysWOW64\plywslnxnltcv.exeplywslnxnltcv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4244 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD59e9ddb97f1eaa7d838b79158e6e22585
SHA1b16e64b6a4c76123159420d3bce4baadbd233ab9
SHA2567231420ac479ceb0a312a312e1184a9b837bf707ddb59988f4dd39918e7a2ddc
SHA512f2ebf8fb488c16bf736003adedc27d66135a5431f65403dbcba735fa3b6e9370ea8091cbbb2e0fa3f599408fa4917582af33a9cad3fd923e6ddb2d2948db964e
-
Filesize
512KB
MD5aa5d5c6410db963c0c1c27f83b4084b1
SHA15f9236dddef952ef752248ada8ef2a34e44e3ac6
SHA2561d5b8b33e642f885eb659385e8165165f087c741775b70240173e13f0402a870
SHA5122399eb453fed1ddd01a97a60914d69b49c12395c04530cbe472fc9bf2115efacb380d07eff94a6469c17396401347de184d220641ea357df30cacd862da0f64e
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5435851c6805bf2643d887f33a8b50975
SHA1879cd06422b3c265fab298dd35b50930581bb249
SHA2569f5114080a7b1c07ce16db68c80badba8e06884c27fc3a7033606f11b7bde52e
SHA512938b109f55fec4340e0ea200f1ed336910384340156e52bf7a2abc896540c01192f5fe74f0ef2fad6ecfae789a469409934073fd6b9fddccf5bed8540c0c2a9b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5d9583fd1a37312822e1ceb9c916a07ac
SHA1291f65bae8d4600bab26934c8935b07d80f0b3fe
SHA2564cbe948c4004d024550aedba45c2a3a1a2f1645c550631c0a9d942803c1382dc
SHA512de583ea06ba7b158eb1ef5e42ba729d35a17f45ee96fbe44b1b1f635da7bf875fe2a387763d3b6f982d8dfc81dc2ea64449a305eb06c7174745090645c297d62
-
Filesize
512KB
MD5eb8de9f6c2e5b3d02b8da8f0188ce577
SHA18f6b629849d101953cd38340441b0a3c64e02cf2
SHA2563d70efc25b10e83883300147796875cf397c6c1a40122a44f97f53e0cca616ce
SHA512e6ece857ccfbc642c7610d2413f3846abada31245f063b0f658323e6f42f1836565e5f54e7f8f00c2d7bd3d15df6c51e623d928610bb58397fe2da3a34a8dc82
-
Filesize
512KB
MD5ade7a38dbb882c47ed5abeedbd20b3bb
SHA115adf43fe80aab93fca0a87795d23ecd50812624
SHA256aece31e48121daecb99ed1cf80543640bf17ee3777268e5a4addfe4c50541772
SHA51256b41d7a88abeb47141bb7ef6118e956687da6d0fd1048be32a579b9d56be7b14381b96908a0fd5a4ceabb668590c14f5c21ca93d69d9794b45c325f81007d35
-
Filesize
512KB
MD574eada1cc24169326e93cbf64cae5461
SHA12c47995410473ef2658c7f8ca0b3687296e84ff8
SHA2569e9e2afd6eb8bd9469f56b6ddcecad11798e4c85402184bec07b01570001a31b
SHA512af8c0bc70ccf6602812470c65cf5be135ad69c1a7527238bfff8db1415d1f88f43452ef3c84c8ae8e10ccd2542d72ae7ffaae53976b8fa288a93795af8970c67
-
Filesize
512KB
MD58b72a6db8764ed1d24a4e8848d1823b6
SHA1ad04153ff0d0e37561d512d20c0d1b1d66d82ee8
SHA256b0b8783574027b4aebae92e212d16fe1e511ec0a0dfb7f8be85443b466ffde25
SHA5125fdf49f1899e0a09f3db6559d6e1bb2281fc0916a7ccfedefada36e67f169a3def1cc62f91f935a6b7cf866bf573cf79d511a7ae7ec6ec9c01fd9dc36024cd7a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD50774e6b74485946a41bb132a64312253
SHA10bb0ef12755e18d2ebf6eee5b3bf8ed44999a9b2
SHA2561a56d180050ff1bcb2fcb7202b6c0feb66ef9f49ebe1c49a1b674da54619d3fe
SHA5128513bcd32459fc521a6210c699317f0aac8518e0cf8399076659b357c8c8231157f02add2694340cff30959e200531f54d11137d6412345fc740157dad66df1f
-
Filesize
512KB
MD50570d111d9d279792621798147715a10
SHA17a7b5232d0505b97e3ba1f5889a98a4e495fb718
SHA25677e83b057f78eb077d292a91ad384cdd5ad8b4be63712c85b2e5bfdceaa5246c
SHA512b1fc6a10a10713544dacceb990e63a99c6d8a885bdf409383e8f7cf6d8d2c0fc32aca5e6c4a248f867651602518a29bbb06015c650e75feafc97f69535d748be