Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 14:01

General

  • Target

    6ec28314060624b0022add23e7a6ec75_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    6ec28314060624b0022add23e7a6ec75

  • SHA1

    8705f88541e8d5d72b3bf23c6ed9422e84d452a9

  • SHA256

    450d7fe5111f3e2ba024b605e992cf2d35944d27169162107ef9c975f0c96f0e

  • SHA512

    f9dc3f5f037aebd6aaaeb34b1436a8ccf9a659330c3420a1308f6a5dfb1b7bafc7f3113a30e53a45a6f2850a673a82193e191fe02d0aa58a5db7c88895757b58

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Q

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ec28314060624b0022add23e7a6ec75_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6ec28314060624b0022add23e7a6ec75_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\fwqfsuzzuv.exe
      fwqfsuzzuv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\dijorvef.exe
        C:\Windows\system32\dijorvef.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2564
    • C:\Windows\SysWOW64\idqrorxtnrqseqf.exe
      idqrorxtnrqseqf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2720
    • C:\Windows\SysWOW64\dijorvef.exe
      dijorvef.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2796
    • C:\Windows\SysWOW64\yfkvifwyhvjkg.exe
      yfkvifwyhvjkg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2656
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2216
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2096

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    3
    T1547

    Registry Run Keys / Startup Folder

    2
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    3
    T1547

    Registry Run Keys / Startup Folder

    2
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    8
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe
      Filesize

      512KB

      MD5

      15e2955b207798b34d9d53303b0578f0

      SHA1

      abf5646310010f50a1558d010f7883a0ba5e288e

      SHA256

      297c2f063adb1a57eed9593bd6f8d8751ed725d4e979c8f68f2ce00b7de5c3bf

      SHA512

      2f165b2f1547bd20ee4fe881143879102ed33d14332d53e9a1c57acfea311193409d62d2f7a1db3681457ce4082172b51de8e6e2f0e52ca302f4f0f44fa2674d

    • C:\Windows\SysWOW64\dijorvef.exe
      Filesize

      512KB

      MD5

      7f2ef2d42005c1fa982dc665acc938e2

      SHA1

      48a7e69347a7b64314c1025a6a34e9622d5ce997

      SHA256

      2cd8e838fb58658ee9538a52cf58b7fd5276a28d3dac0a6352cb4478643c0fc8

      SHA512

      ccafd84ba8ebcaba6745ac781bcc059908764d8eaf729c41dfa043a73bc275973e8461af38b2547beb115921548424fd80a8f51a38ed7ea729ea99fb6515b418

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\fwqfsuzzuv.exe
      Filesize

      512KB

      MD5

      37a90d6a3c9bb894a35f1d93e3f6c1ab

      SHA1

      78c620728bfc702b42646b08c4b1e95d563fa9c3

      SHA256

      fc2e2ad58779defcbc1c2beaca5232d0855fe9e309a0ca231403751d0bf9f098

      SHA512

      dc72b2ac0fbd42cde6aaf8762a14946fd2c6850600ed52bc16c0d628d93afe22fc43a902b028bf691a7ecd6fe02d9b27c54220c2aa98fbf34b9d5b63cb575e80

    • \Windows\SysWOW64\idqrorxtnrqseqf.exe
      Filesize

      512KB

      MD5

      d5e666708b3df1003b0fab7dc6a9c0ed

      SHA1

      c9664fa2db0fdc9f6b07e018ee5c8ab80dc42015

      SHA256

      05b79350d2db8f484811b94998f5895efa9454402fa825afc475ba731f8ec469

      SHA512

      0891f1ce9912e294a3e45d15a16abbcf90ee71987598fe18ba1b0933dd20be6e95ac93d70c6a468e545cf8b83066356c30854093cf75e2d85d72cb4612d02d8a

    • \Windows\SysWOW64\yfkvifwyhvjkg.exe
      Filesize

      512KB

      MD5

      655ec1ee8874dcba38ba09e035ec2c7d

      SHA1

      b1b2fb36ec997af37f604fe18dfa013fa2fc2324

      SHA256

      5ee6582fd1f9947353ef81520410da96eb8798c0349bcab1dc9c517fb39f2a73

      SHA512

      9d5c4d43e2a5d8f4c009d2191a11a1b5501ad7d2967e6b5b9f549352badeb74dd9235d673b3c075de3e31c074e9ca522936adfbf61a30f6e73ce67146feade6a

    • memory/1632-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB

    • memory/2096-83-0x0000000002B30000-0x0000000002B40000-memory.dmp
      Filesize

      64KB

    • memory/2516-45-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB