Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe
-
Size
512KB
-
MD5
6e7e40f9cb83d0043a8426332037476c
-
SHA1
ab0b589a454478f0250eeaca3c0a0729d35400ec
-
SHA256
34dce2f24de63ffd23c62e19fdaee34e63c0a7d974c883295036a1669ceecfce
-
SHA512
a28ea24ea9bffe3a3352a605a3b3c62da132d804661c14843ab968eae747aa2b57f14e7ce6f1833faff3f31e24a5e20d17bb6aaed194706ea5c8680b7d68a8ac
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6X:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5I
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
dskuzwvlja.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dskuzwvlja.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
dskuzwvlja.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dskuzwvlja.exe -
Processes:
dskuzwvlja.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dskuzwvlja.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
dskuzwvlja.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dskuzwvlja.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
dskuzwvlja.exesaugsmphehvffic.exexnapquvv.exejbqujtuyonbll.exexnapquvv.exepid process 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 4468 xnapquvv.exe 3964 jbqujtuyonbll.exe 1484 xnapquvv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
dskuzwvlja.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" dskuzwvlja.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
saugsmphehvffic.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dfoanzxa = "dskuzwvlja.exe" saugsmphehvffic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bcgqqmnj = "saugsmphehvffic.exe" saugsmphehvffic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jbqujtuyonbll.exe" saugsmphehvffic.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
xnapquvv.exexnapquvv.exedskuzwvlja.exedescription ioc process File opened (read-only) \??\q: xnapquvv.exe File opened (read-only) \??\v: xnapquvv.exe File opened (read-only) \??\b: xnapquvv.exe File opened (read-only) \??\l: xnapquvv.exe File opened (read-only) \??\k: dskuzwvlja.exe File opened (read-only) \??\m: xnapquvv.exe File opened (read-only) \??\v: xnapquvv.exe File opened (read-only) \??\u: dskuzwvlja.exe File opened (read-only) \??\y: xnapquvv.exe File opened (read-only) \??\g: xnapquvv.exe File opened (read-only) \??\p: xnapquvv.exe File opened (read-only) \??\s: xnapquvv.exe File opened (read-only) \??\o: xnapquvv.exe File opened (read-only) \??\a: xnapquvv.exe File opened (read-only) \??\x: xnapquvv.exe File opened (read-only) \??\p: dskuzwvlja.exe File opened (read-only) \??\w: dskuzwvlja.exe File opened (read-only) \??\g: xnapquvv.exe File opened (read-only) \??\s: dskuzwvlja.exe File opened (read-only) \??\j: xnapquvv.exe File opened (read-only) \??\z: xnapquvv.exe File opened (read-only) \??\e: xnapquvv.exe File opened (read-only) \??\h: xnapquvv.exe File opened (read-only) \??\j: xnapquvv.exe File opened (read-only) \??\a: dskuzwvlja.exe File opened (read-only) \??\b: dskuzwvlja.exe File opened (read-only) \??\h: xnapquvv.exe File opened (read-only) \??\k: xnapquvv.exe File opened (read-only) \??\n: xnapquvv.exe File opened (read-only) \??\t: xnapquvv.exe File opened (read-only) \??\u: xnapquvv.exe File opened (read-only) \??\r: xnapquvv.exe File opened (read-only) \??\w: xnapquvv.exe File opened (read-only) \??\j: dskuzwvlja.exe File opened (read-only) \??\o: dskuzwvlja.exe File opened (read-only) \??\b: xnapquvv.exe File opened (read-only) \??\l: xnapquvv.exe File opened (read-only) \??\k: xnapquvv.exe File opened (read-only) \??\q: dskuzwvlja.exe File opened (read-only) \??\t: dskuzwvlja.exe File opened (read-only) \??\y: dskuzwvlja.exe File opened (read-only) \??\p: xnapquvv.exe File opened (read-only) \??\z: xnapquvv.exe File opened (read-only) \??\i: dskuzwvlja.exe File opened (read-only) \??\l: dskuzwvlja.exe File opened (read-only) \??\v: dskuzwvlja.exe File opened (read-only) \??\a: xnapquvv.exe File opened (read-only) \??\i: xnapquvv.exe File opened (read-only) \??\q: xnapquvv.exe File opened (read-only) \??\e: dskuzwvlja.exe File opened (read-only) \??\w: xnapquvv.exe File opened (read-only) \??\z: dskuzwvlja.exe File opened (read-only) \??\m: xnapquvv.exe File opened (read-only) \??\o: xnapquvv.exe File opened (read-only) \??\u: xnapquvv.exe File opened (read-only) \??\m: dskuzwvlja.exe File opened (read-only) \??\n: dskuzwvlja.exe File opened (read-only) \??\r: dskuzwvlja.exe File opened (read-only) \??\x: dskuzwvlja.exe File opened (read-only) \??\i: xnapquvv.exe File opened (read-only) \??\n: xnapquvv.exe File opened (read-only) \??\e: xnapquvv.exe File opened (read-only) \??\y: xnapquvv.exe File opened (read-only) \??\s: xnapquvv.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
dskuzwvlja.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" dskuzwvlja.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" dskuzwvlja.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4228-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\saugsmphehvffic.exe autoit_exe C:\Windows\SysWOW64\dskuzwvlja.exe autoit_exe C:\Windows\SysWOW64\xnapquvv.exe autoit_exe C:\Windows\SysWOW64\jbqujtuyonbll.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
xnapquvv.exe6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exexnapquvv.exedskuzwvlja.exedescription ioc process File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xnapquvv.exe File created C:\Windows\SysWOW64\jbqujtuyonbll.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jbqujtuyonbll.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification C:\Windows\SysWOW64\dskuzwvlja.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\saugsmphehvffic.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xnapquvv.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File created C:\Windows\SysWOW64\dskuzwvlja.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File created C:\Windows\SysWOW64\xnapquvv.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll dskuzwvlja.exe File created C:\Windows\SysWOW64\saugsmphehvffic.exe 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xnapquvv.exe -
Drops file in Program Files directory 8 IoCs
Processes:
xnapquvv.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xnapquvv.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xnapquvv.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xnapquvv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xnapquvv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xnapquvv.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xnapquvv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xnapquvv.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xnapquvv.exe -
Drops file in Windows directory 19 IoCs
Processes:
xnapquvv.exeWINWORD.EXExnapquvv.exe6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xnapquvv.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xnapquvv.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xnapquvv.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification C:\Windows\mydoc.rtf 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xnapquvv.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xnapquvv.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xnapquvv.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xnapquvv.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xnapquvv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
dskuzwvlja.exe6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" dskuzwvlja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs dskuzwvlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33472D7B9C2282236D3677D777202CAB7D8464D8" 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" dskuzwvlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" dskuzwvlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" dskuzwvlja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg dskuzwvlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCDFACCFE13F1E784083B35819B3999B08A02FC4215033FE1C842E908A9" 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh dskuzwvlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F56BB3FE6B21D9D27ED1A48B0E916B" 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1839C60B15E5DBC5B9BC7CE9ED9034BC" 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat dskuzwvlja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc dskuzwvlja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf dskuzwvlja.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B15D47EF38E252CFB9D73393D4B9" 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFFFC4F58826D9132D6587E90BCE4E13D593267456332D798" 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" dskuzwvlja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" dskuzwvlja.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 848 WINWORD.EXE 848 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exexnapquvv.exesaugsmphehvffic.exedskuzwvlja.exejbqujtuyonbll.exexnapquvv.exepid process 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 4052 saugsmphehvffic.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exexnapquvv.exedskuzwvlja.exesaugsmphehvffic.exejbqujtuyonbll.exexnapquvv.exepid process 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exexnapquvv.exedskuzwvlja.exesaugsmphehvffic.exejbqujtuyonbll.exexnapquvv.exepid process 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 4468 xnapquvv.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 3468 dskuzwvlja.exe 4052 saugsmphehvffic.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 3964 jbqujtuyonbll.exe 1484 xnapquvv.exe 1484 xnapquvv.exe 1484 xnapquvv.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 848 WINWORD.EXE 848 WINWORD.EXE 848 WINWORD.EXE 848 WINWORD.EXE 848 WINWORD.EXE 848 WINWORD.EXE 848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exedskuzwvlja.exedescription pid process target process PID 4228 wrote to memory of 3468 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe dskuzwvlja.exe PID 4228 wrote to memory of 3468 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe dskuzwvlja.exe PID 4228 wrote to memory of 3468 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe dskuzwvlja.exe PID 4228 wrote to memory of 4052 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe saugsmphehvffic.exe PID 4228 wrote to memory of 4052 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe saugsmphehvffic.exe PID 4228 wrote to memory of 4052 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe saugsmphehvffic.exe PID 4228 wrote to memory of 4468 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe xnapquvv.exe PID 4228 wrote to memory of 4468 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe xnapquvv.exe PID 4228 wrote to memory of 4468 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe xnapquvv.exe PID 4228 wrote to memory of 3964 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe jbqujtuyonbll.exe PID 4228 wrote to memory of 3964 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe jbqujtuyonbll.exe PID 4228 wrote to memory of 3964 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe jbqujtuyonbll.exe PID 4228 wrote to memory of 848 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe WINWORD.EXE PID 4228 wrote to memory of 848 4228 6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe WINWORD.EXE PID 3468 wrote to memory of 1484 3468 dskuzwvlja.exe xnapquvv.exe PID 3468 wrote to memory of 1484 3468 dskuzwvlja.exe xnapquvv.exe PID 3468 wrote to memory of 1484 3468 dskuzwvlja.exe xnapquvv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e7e40f9cb83d0043a8426332037476c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\dskuzwvlja.exedskuzwvlja.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\xnapquvv.exeC:\Windows\system32\xnapquvv.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1484 -
C:\Windows\SysWOW64\saugsmphehvffic.exesaugsmphehvffic.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4052 -
C:\Windows\SysWOW64\xnapquvv.exexnapquvv.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4468 -
C:\Windows\SysWOW64\jbqujtuyonbll.exejbqujtuyonbll.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3964 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5eaddbe096aa8b1327299c702acdaf947
SHA1c6c7d155220cb8bb33821dbbd9eab768515706fc
SHA2568534d312348e7d6a1f1644ffc720e1d65d8e306d9cbf2155741ce07c5af6050e
SHA512ec6fa8611eacd77a5cb9f3e1a2f348c1fa18250dc74241233c0df9364fa016d2523063e3ee385ee1c5757d905077f4161610eca0063b86cafb6af2e2507e3791
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD511325007bea83b2c08aa4bc770910b46
SHA19a08d6634655e3009517e170b0ed6092c135db70
SHA25686a73b9f67fdd17d09c0ce7f7b4c6237b5c89c450a60f6da5bf53c2ae141ac38
SHA5122033271afea4e816ed02c83c8ab26a56b736f77de7fbfca754bb5daa908f1e7b481a383b65e3e1448e92b266b555ba1d9ce9751f3cd2353c3a3375f6e6de2336
-
Filesize
512KB
MD531698c97423eca6965648116b73bc121
SHA1b57529f53f26ab1c22238e2f462e20500f9d99bd
SHA2569d81d70e7028df6eba2b59d8b3a1f3b5ca05f3e0a7d6d7306ba9f5a13699c636
SHA51248c78e42612e3dc387af781fec0d0a15bf5575dfa404bebec38c38d199a8a941e63a355211740d8479317a5fe7d4b3841cd324f5a82cfc4ddf4654c78cd50a0e
-
Filesize
512KB
MD583bab78c57820f6fc6f74046f37cac0f
SHA1c89f25a1525c3eadda0cfad71c08ac80292545ed
SHA25636a864289269b910f36ab3fec76846bd5424c89b6a4d39e3b2b984662b0dac84
SHA51232b2480f21dad241b4d0520c570938a370f59a07cdb5b687033974fe03aa587f35b75114bbfc5c012257f55cb2fab797601f28c4bdf77b678ab5bd53eb67faa5
-
Filesize
512KB
MD5bd8d0197496d8c47900537dbc2b8520d
SHA1135abeec8f2c686b052c2686aaee9324c3212d13
SHA2561d73131f9d874076905e877262d7dece0d730484279306d43cf1975631c0c02f
SHA512220352c75ebb30a8e55de1d790059aaa28b96e7c18f33e4837aefe0dc26bb000477c4530ebddbe47b546e7acc1d307c59b2dd0833d2040d5107c4dd96a0f8167
-
Filesize
512KB
MD5c39cdd0602495eb1074b4e99df77313c
SHA15a3192277d5c69aa81d0e60d994ec6a4dfe38cfd
SHA256d78d6e0fc44900cf18d95a283158a9c2dd1d3a64be7f56473b4c04d273058157
SHA512e736f5433b54077cd0ca701d58fbb094fa3e5c88543ca1c38679f5634eebefe9e59442b90b797832f1c0cbfa3b85c9ed1dac942c07c634292fc7764681843946
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD543580b79273bbe8b88c7de905f2373a6
SHA11bda6660894caad914b8b04a8a2796e51b2e7b9b
SHA2560661b892600d81ece8715a269d3f8072578e3a1d1ebcf3a4f235c7bd3540ea4c
SHA51250714fe3d188827227faa61b663680b91b7f5cbfe84f1d5d1b5dfc3d8f72f6f5198845b1be02c4fed99f7ca7a4cbb174a6b7850b60ebd8292d3639c2f1b265ff
-
Filesize
512KB
MD56786f6a589dcad5fc5463452ba2c31be
SHA195a46100081c3388320a07613fdb9956c20b9e01
SHA256d3dcbcd7d0d438ffb1c16b87ab8228d6cfafe46284e71254c765abb48b2a7896
SHA512459a68260a89586ee011dc0f4186c1a05bee797ef8bed28b605526e68d2167f7fd5a7ccb28482d85263dbbfdf4dd532cbbf883fdb4c017407483d00c5c254c7a