Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe
-
Size
512KB
-
MD5
6e680ddbbcf07f65e472b75485ce2514
-
SHA1
b8d87c2bad765ee6644af76ce608e7451940681d
-
SHA256
911ece796811f0d61fc4bb7215de3139ed351813e7777d5dd469a85778589a3b
-
SHA512
a76a6e2c40f89dfd0e32ffc9367295f22e515c716889a7c8dd2faf3717fcf83d249d7d53d5ed5c19a323d799fdce17a4bde1a704419ae2fbf604b79d0ee777a4
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
rfwxaawgcq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rfwxaawgcq.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
rfwxaawgcq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rfwxaawgcq.exe -
Processes:
rfwxaawgcq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rfwxaawgcq.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
rfwxaawgcq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rfwxaawgcq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
rfwxaawgcq.exetkkmytjschlcomw.exeijhsnuwy.exeonacvpaymgsso.exeijhsnuwy.exepid process 3840 rfwxaawgcq.exe 4688 tkkmytjschlcomw.exe 684 ijhsnuwy.exe 3404 onacvpaymgsso.exe 696 ijhsnuwy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
rfwxaawgcq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rfwxaawgcq.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tkkmytjschlcomw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tlqbkvvm = "rfwxaawgcq.exe" tkkmytjschlcomw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\napfzpsx = "tkkmytjschlcomw.exe" tkkmytjschlcomw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "onacvpaymgsso.exe" tkkmytjschlcomw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ijhsnuwy.exeijhsnuwy.exerfwxaawgcq.exedescription ioc process File opened (read-only) \??\b: ijhsnuwy.exe File opened (read-only) \??\l: ijhsnuwy.exe File opened (read-only) \??\y: ijhsnuwy.exe File opened (read-only) \??\v: ijhsnuwy.exe File opened (read-only) \??\y: rfwxaawgcq.exe File opened (read-only) \??\z: rfwxaawgcq.exe File opened (read-only) \??\h: ijhsnuwy.exe File opened (read-only) \??\s: ijhsnuwy.exe File opened (read-only) \??\j: rfwxaawgcq.exe File opened (read-only) \??\e: ijhsnuwy.exe File opened (read-only) \??\j: ijhsnuwy.exe File opened (read-only) \??\k: ijhsnuwy.exe File opened (read-only) \??\m: ijhsnuwy.exe File opened (read-only) \??\y: ijhsnuwy.exe File opened (read-only) \??\u: rfwxaawgcq.exe File opened (read-only) \??\s: ijhsnuwy.exe File opened (read-only) \??\i: ijhsnuwy.exe File opened (read-only) \??\p: ijhsnuwy.exe File opened (read-only) \??\a: ijhsnuwy.exe File opened (read-only) \??\i: ijhsnuwy.exe File opened (read-only) \??\w: rfwxaawgcq.exe File opened (read-only) \??\q: ijhsnuwy.exe File opened (read-only) \??\n: ijhsnuwy.exe File opened (read-only) \??\w: ijhsnuwy.exe File opened (read-only) \??\n: ijhsnuwy.exe File opened (read-only) \??\p: rfwxaawgcq.exe File opened (read-only) \??\v: rfwxaawgcq.exe File opened (read-only) \??\x: rfwxaawgcq.exe File opened (read-only) \??\u: ijhsnuwy.exe File opened (read-only) \??\w: ijhsnuwy.exe File opened (read-only) \??\a: rfwxaawgcq.exe File opened (read-only) \??\s: rfwxaawgcq.exe File opened (read-only) \??\g: ijhsnuwy.exe File opened (read-only) \??\g: ijhsnuwy.exe File opened (read-only) \??\h: ijhsnuwy.exe File opened (read-only) \??\l: ijhsnuwy.exe File opened (read-only) \??\o: ijhsnuwy.exe File opened (read-only) \??\r: rfwxaawgcq.exe File opened (read-only) \??\t: rfwxaawgcq.exe File opened (read-only) \??\r: ijhsnuwy.exe File opened (read-only) \??\z: ijhsnuwy.exe File opened (read-only) \??\g: rfwxaawgcq.exe File opened (read-only) \??\l: rfwxaawgcq.exe File opened (read-only) \??\p: ijhsnuwy.exe File opened (read-only) \??\a: ijhsnuwy.exe File opened (read-only) \??\r: ijhsnuwy.exe File opened (read-only) \??\t: ijhsnuwy.exe File opened (read-only) \??\i: rfwxaawgcq.exe File opened (read-only) \??\b: ijhsnuwy.exe File opened (read-only) \??\k: ijhsnuwy.exe File opened (read-only) \??\m: ijhsnuwy.exe File opened (read-only) \??\j: ijhsnuwy.exe File opened (read-only) \??\e: rfwxaawgcq.exe File opened (read-only) \??\o: rfwxaawgcq.exe File opened (read-only) \??\o: ijhsnuwy.exe File opened (read-only) \??\t: ijhsnuwy.exe File opened (read-only) \??\q: ijhsnuwy.exe File opened (read-only) \??\h: rfwxaawgcq.exe File opened (read-only) \??\x: ijhsnuwy.exe File opened (read-only) \??\e: ijhsnuwy.exe File opened (read-only) \??\x: ijhsnuwy.exe File opened (read-only) \??\q: rfwxaawgcq.exe File opened (read-only) \??\k: rfwxaawgcq.exe File opened (read-only) \??\m: rfwxaawgcq.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
rfwxaawgcq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rfwxaawgcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rfwxaawgcq.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4812-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\tkkmytjschlcomw.exe autoit_exe C:\Windows\SysWOW64\rfwxaawgcq.exe autoit_exe C:\Windows\SysWOW64\ijhsnuwy.exe autoit_exe C:\Windows\SysWOW64\onacvpaymgsso.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exeijhsnuwy.exerfwxaawgcq.exeijhsnuwy.exedescription ioc process File created C:\Windows\SysWOW64\tkkmytjschlcomw.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tkkmytjschlcomw.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File created C:\Windows\SysWOW64\ijhsnuwy.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File created C:\Windows\SysWOW64\onacvpaymgsso.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\onacvpaymgsso.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification C:\Windows\SysWOW64\rfwxaawgcq.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ijhsnuwy.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rfwxaawgcq.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ijhsnuwy.exe File created C:\Windows\SysWOW64\rfwxaawgcq.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
ijhsnuwy.exeijhsnuwy.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ijhsnuwy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ijhsnuwy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ijhsnuwy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ijhsnuwy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ijhsnuwy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ijhsnuwy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ijhsnuwy.exe -
Drops file in Windows directory 19 IoCs
Processes:
ijhsnuwy.exeijhsnuwy.exe6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification C:\Windows\mydoc.rtf 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ijhsnuwy.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe ijhsnuwy.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe ijhsnuwy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
rfwxaawgcq.exe6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rfwxaawgcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf rfwxaawgcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rfwxaawgcq.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8FABFF966F19484793A4586EA3E92B08C02FC4364033AE1B842ED09D4" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFEFF89485885129045D65C7D94BCE4E144594066446246D79B" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rfwxaawgcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412C7E9D5582576A4676D177212CD97DF665D8" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rfwxaawgcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rfwxaawgcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC2B12047E6389A53BFB9D73392D4CF" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184EC60914E2DAC4B9CE7FE4ECE437BA" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" rfwxaawgcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc rfwxaawgcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rfwxaawgcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F56BB9FF1C21DAD27BD1A88B7F9167" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rfwxaawgcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rfwxaawgcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rfwxaawgcq.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 644 WINWORD.EXE 644 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exerfwxaawgcq.exetkkmytjschlcomw.exeijhsnuwy.exeonacvpaymgsso.exepid process 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exerfwxaawgcq.exetkkmytjschlcomw.exeijhsnuwy.exeonacvpaymgsso.exeijhsnuwy.exepid process 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 684 ijhsnuwy.exe 3404 onacvpaymgsso.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 696 ijhsnuwy.exe 696 ijhsnuwy.exe 696 ijhsnuwy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exerfwxaawgcq.exetkkmytjschlcomw.exeijhsnuwy.exeonacvpaymgsso.exeijhsnuwy.exepid process 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 3840 rfwxaawgcq.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 4688 tkkmytjschlcomw.exe 684 ijhsnuwy.exe 3404 onacvpaymgsso.exe 684 ijhsnuwy.exe 684 ijhsnuwy.exe 3404 onacvpaymgsso.exe 3404 onacvpaymgsso.exe 696 ijhsnuwy.exe 696 ijhsnuwy.exe 696 ijhsnuwy.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 644 WINWORD.EXE 644 WINWORD.EXE 644 WINWORD.EXE 644 WINWORD.EXE 644 WINWORD.EXE 644 WINWORD.EXE 644 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exerfwxaawgcq.exedescription pid process target process PID 4812 wrote to memory of 3840 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rfwxaawgcq.exe PID 4812 wrote to memory of 3840 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rfwxaawgcq.exe PID 4812 wrote to memory of 3840 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rfwxaawgcq.exe PID 4812 wrote to memory of 4688 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe tkkmytjschlcomw.exe PID 4812 wrote to memory of 4688 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe tkkmytjschlcomw.exe PID 4812 wrote to memory of 4688 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe tkkmytjschlcomw.exe PID 4812 wrote to memory of 684 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ijhsnuwy.exe PID 4812 wrote to memory of 684 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ijhsnuwy.exe PID 4812 wrote to memory of 684 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ijhsnuwy.exe PID 4812 wrote to memory of 3404 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe onacvpaymgsso.exe PID 4812 wrote to memory of 3404 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe onacvpaymgsso.exe PID 4812 wrote to memory of 3404 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe onacvpaymgsso.exe PID 4812 wrote to memory of 644 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe WINWORD.EXE PID 4812 wrote to memory of 644 4812 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe WINWORD.EXE PID 3840 wrote to memory of 696 3840 rfwxaawgcq.exe ijhsnuwy.exe PID 3840 wrote to memory of 696 3840 rfwxaawgcq.exe ijhsnuwy.exe PID 3840 wrote to memory of 696 3840 rfwxaawgcq.exe ijhsnuwy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\rfwxaawgcq.exerfwxaawgcq.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\ijhsnuwy.exeC:\Windows\system32\ijhsnuwy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:696 -
C:\Windows\SysWOW64\tkkmytjschlcomw.exetkkmytjschlcomw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4688 -
C:\Windows\SysWOW64\ijhsnuwy.exeijhsnuwy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:684 -
C:\Windows\SysWOW64\onacvpaymgsso.exeonacvpaymgsso.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3404 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5e6abad7ea4a43f7c9554a78a945358c3
SHA1590e35f7a0fb671bcbe68d93119ebc15659d90f9
SHA2561a03aef0a1ffb533b6ff2929cbcc4e67d381288df0baeb0ab7c7431a78bc4fb4
SHA512128b0e77e08f7b682ff357e71484e136fe4a28ec3bc81ca1820616006a39516ffa54739c59161b13991f167e4d64286203496c11ddc9a1c70cb74eb767c948d2
-
Filesize
512KB
MD567701f6955f0c9cd56b55ac5eb1e1940
SHA1c704ca163d19b25fad6541b94524ee8a53a4fe66
SHA256665c0a8e62692809074dc18a8845720ca9956a960a10eb590f3efbdbd5fbd03c
SHA5125250ba04da3077cb6d86704935ca7258169ebd1488b023d9cfa58e4c76c885f1bb7880de20aafcfa57acac14ff64f4bff154939c113b93794b7fd4cf8cd0e346
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD589a4ad3afdfea1a40727ba57c20dd48e
SHA14e0b9168695b38f36d30dc2e8a10b8da82e37bef
SHA25640220a92b6dfacf4dd93064eb954fa6a99cc264d01e323da4742748945507fe2
SHA5125dc089f959a091d01828390fa20bd7a3980c65281bc99ec111e854fc762ff46b99665a7563bf284307d2c420118df0fd3051101632985fb848e9843e02ce0ee0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57172589e5c839fc5b2459daea5655da1
SHA1ac8feb6c5c24bf7c73ab5d2462d2ebd68db7bbef
SHA25632c9c860e063561c41ef5e383873c1d9ff54f67de070fe73cbaa9c9b3d7bcd0f
SHA51271bd6cac5059a458c7133dbd9f79e391526776347dd42e39db20d7bfb069887e0c59f89183e60723f4b0839a45c7561d92eed2adc76bcf7cff91640392af01f0
-
Filesize
512KB
MD5bf63d745a0305b9ff57359a15a2981b6
SHA18ac354151bf32d873fc3d5dfde66e6711d5b3f8a
SHA25647c09fc01545bf204078195d7f37c0401c8ca841a195e0b4aae28f0c3178d1ad
SHA5120402298aca4263c009da12f8595f5a4e5fe7189e1bf12ba8ede6e280add29c5fb86758754bd6ffb0b09f367b554bcb4af29f8014b7faafbfeaf5da8c8aa6c64c
-
Filesize
512KB
MD5b7c509ab7d58761b975920257ea0c164
SHA18496092e102609de54ef5f5de0effda434cce53e
SHA256b6d127c74d0b986f5672b62703668df93d56150839ec946d4a7bcc53ff71eb8a
SHA512c9d4e7b275b9edc124deead438b6cb30b17eff55e1174d2bce51860889bb35a0dbf86ac516dd91791839f19e2592e0ca5b5c65986537b4e94fbe5a4bf30ac92f
-
Filesize
512KB
MD58cf61ba3922882a958a699f243e656cc
SHA18690f3c0f648499e81750cea2466b69ee0ca8163
SHA25694c848064e9ee4ca05b9efe489a7bb5cdce0dabaab4c9c73a936bb7ff7224480
SHA51266d53a91bf3e60c41a2bfca04c9766976e90383158d74e5e517d65c801aaf2b1e376742e186e66bccb887d62e68548faadd512605b003e86ad0a4a56a9e88450
-
Filesize
512KB
MD579dd1e97c538ebf0ffd4e6c417da9e64
SHA15c4d7d2ae620a3d04f8c702386c4f74450fc1cb6
SHA256d14033c5acbba95205f738da2df44caffbba62a939657c653702874b38ca9eb4
SHA512f7969c505e88463a04f8775f4eefca5f8b2330ee201fa7d28c79c6f53f1cf96a811f20835fe41b0a3281cd378cdd85e09ae02f7c6b54707b7d115a8ef70c71f4
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD535b3f1c3af65cfce66cfc9b8bc65772e
SHA14d7a127ff075b795c969b97663123e959c05a95c
SHA2560025a62f78b7229a7bf95ee228e7e86c043c60cfd5b89dd8abb59bfd11bf1afb
SHA512f91c335484bb967d0d026c034570eae6c59c269627acf0fd3372173a9578b12c280be10e55b18bea993ee1595f33c5008cd05eaa35732d5c29c5ac0f6f8ea6f6
-
Filesize
512KB
MD5412baf18f1b38ee4d52afc289fcfa66f
SHA163b4ae4ffc235052cf698118d35403b95e556bcb
SHA256eab45040f8b6708e6ea1f31091850a92fc7aa5b448a6286e481b53e67ce0bad8
SHA5120815616470efe3a9e81db0941c42d84d30706dbe5f1a7db3ca2ec46eef7a0d969005c253a02a1f35b9d548b257257ab1a78ee16e2fa871092890a369ab819999