Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 19:20

General

  • Target

    6f91d104958a5ca488ef235eec0c5cb4_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    6f91d104958a5ca488ef235eec0c5cb4

  • SHA1

    da2b08f41effa470dc52346de414c245ecd7a464

  • SHA256

    b6f0f81ecbef63b78f96402aea3b00e8443acaa76c130d9ba685c517cdae21ee

  • SHA512

    d267842ff5fd158fe1700cfa7be1c6b086e9cb12a86f836e068adddc1574793a5a08f1b8d299c188ca597a036bd191612df3f32c0a9f360a99eb3f183be6527d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5G

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f91d104958a5ca488ef235eec0c5cb4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f91d104958a5ca488ef235eec0c5cb4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\votvkxkmny.exe
      votvkxkmny.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\SysWOW64\kuqtkpas.exe
        C:\Windows\system32\kuqtkpas.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2836
    • C:\Windows\SysWOW64\ebagukuxdbgcrto.exe
      ebagukuxdbgcrto.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2716
    • C:\Windows\SysWOW64\kuqtkpas.exe
      kuqtkpas.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2608
    • C:\Windows\SysWOW64\oyfbresvcvxlf.exe
      oyfbresvcvxlf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2628
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:780

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    7
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      26ad248c82c67bfe574afb72b78a0294

      SHA1

      34ea6c9021b5fba88fb0d3b4a30bbc1351bacfb3

      SHA256

      28dbfcc14b58d4c19cfd3e06f8975a4f9aeffedd4583b807cb8aa8ad497201c5

      SHA512

      2e35c79bdfbd66a355dd54e8347e99ce8568c0033c33fb4df94162bf14b206315050e29d56d328bdd3d6d30da4edafc08b777aa968a78fec7d729e87475e31cb

    • C:\Users\Admin\Desktop\EnterWrite.doc.exe
      Filesize

      512KB

      MD5

      b67d897ff41ba7a0958b271c8a5638f8

      SHA1

      ab556205112ddc2c4f22d9ed5d6cc85aef56ecd9

      SHA256

      eb2e3820ed292314026e0681e3a753fe7de84d7b5e8d01fb2475d34e6ec630bd

      SHA512

      a6c7506197d790407f5f600f9bf32d3860ca303df4e3b75e9be948dee0446a768d541d87400f942af4109347c4c0165c385d20dc7b145e97be161e15c16d4c3e

    • C:\Windows\SysWOW64\ebagukuxdbgcrto.exe
      Filesize

      512KB

      MD5

      796252b5108ae1d20a1b812064ffb97c

      SHA1

      80bdb00930f4d24ec71f96650e9329466726d2e9

      SHA256

      4d96259c019700a3940f0f852525c659d0caa2f8a5a6d63f712a12410d1af958

      SHA512

      dd35f1aa4f9ab3f83ebc6d38d24ef07a210c79e263aeff1f9284fdb3b5e48870144a0b1d59401ca5333b6ac248b519744d3afead0f66ff5bf4710584dc52a0f9

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\kuqtkpas.exe
      Filesize

      512KB

      MD5

      05842f3bdac1774df33a6ea62920156e

      SHA1

      b5f7c029aedd0ee1e4a3eb86ea2778b123249153

      SHA256

      24d9396d61a006d07eb9b8d31dff187b1c26c8252e2d59ec7edcb717ea38d2ba

      SHA512

      7a76c22944bb3cf9d1d3982359b2c463c4ac2b6540cbbbe031673a8c07975274bf8b4bc6c73bd8fc22652c02d7e8926ed306c2acabb3bb24279d5213b307b8d2

    • \Windows\SysWOW64\oyfbresvcvxlf.exe
      Filesize

      512KB

      MD5

      4bf1aabf4cd161abe40f1398158d4ea6

      SHA1

      af3356722090f033507d63c550f654525f714b85

      SHA256

      4fb52df7d7e90e0c750e64399163d371fd9ab65c4adbeca3df495d29c824928c

      SHA512

      c8fd9309bc306c507dad382ec83953dafb4f78f9a2093735f21add4e7c17d41668254a0761a571086b5e180b09e03a27a8ffd93e5ca65aa4d8d9528da01e716e

    • \Windows\SysWOW64\votvkxkmny.exe
      Filesize

      512KB

      MD5

      3cd316a9ede96293ff979dca168747ed

      SHA1

      b0b72ac61b560805ada866830fd0591ab7d19f4e

      SHA256

      e4bc0b666aecb7d5e2a8ccbd63714d810e111a4ae2da78fa7caa08ffdea377ec

      SHA512

      3a3577d9b41d4f993b8da1a7f82dff6fa776d58ffba68ce2779a44127839ba6a6cac59259f07453f877d1b5a18bc03185f50ed279fe9104b1cbbaaea37b3f1aa

    • memory/2176-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB

    • memory/2720-45-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2720-102-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB