Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe
-
Size
512KB
-
MD5
7800a1bda107b1aed0fc59d3b13da650
-
SHA1
f7b349a94811c5baf83d6aa3fa52ebac65d7b193
-
SHA256
1aa8b7af73650b36af91531936ca3b9270144f7433b8f74329bf8cdc6a4e3c3f
-
SHA512
40aed307d0efe3cb57bcf8927002de30438a131a6b1cfa50c306a59e65a1bd04b4121be022d9cf8c6e4d9606eb1dc0f4f6100f187f936aa9f4c9aaa357d67a39
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6K:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ecbbkqxsny.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ecbbkqxsny.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ecbbkqxsny.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ecbbkqxsny.exe -
Processes:
ecbbkqxsny.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ecbbkqxsny.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ecbbkqxsny.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ecbbkqxsny.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
ecbbkqxsny.exeqnzsbpmwqxjwkbq.exebbmdejvu.exeapsvvavfelqqm.exebbmdejvu.exepid process 1536 ecbbkqxsny.exe 3436 qnzsbpmwqxjwkbq.exe 2128 bbmdejvu.exe 4696 apsvvavfelqqm.exe 4780 bbmdejvu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ecbbkqxsny.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ecbbkqxsny.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
qnzsbpmwqxjwkbq.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\prtcwaoc = "ecbbkqxsny.exe" qnzsbpmwqxjwkbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ejvkdioj = "qnzsbpmwqxjwkbq.exe" qnzsbpmwqxjwkbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "apsvvavfelqqm.exe" qnzsbpmwqxjwkbq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ecbbkqxsny.exebbmdejvu.exebbmdejvu.exedescription ioc process File opened (read-only) \??\g: ecbbkqxsny.exe File opened (read-only) \??\k: bbmdejvu.exe File opened (read-only) \??\n: bbmdejvu.exe File opened (read-only) \??\p: bbmdejvu.exe File opened (read-only) \??\a: ecbbkqxsny.exe File opened (read-only) \??\w: ecbbkqxsny.exe File opened (read-only) \??\i: bbmdejvu.exe File opened (read-only) \??\m: bbmdejvu.exe File opened (read-only) \??\n: bbmdejvu.exe File opened (read-only) \??\u: bbmdejvu.exe File opened (read-only) \??\x: bbmdejvu.exe File opened (read-only) \??\o: ecbbkqxsny.exe File opened (read-only) \??\a: bbmdejvu.exe File opened (read-only) \??\j: bbmdejvu.exe File opened (read-only) \??\v: ecbbkqxsny.exe File opened (read-only) \??\l: ecbbkqxsny.exe File opened (read-only) \??\e: bbmdejvu.exe File opened (read-only) \??\j: ecbbkqxsny.exe File opened (read-only) \??\q: bbmdejvu.exe File opened (read-only) \??\l: bbmdejvu.exe File opened (read-only) \??\v: bbmdejvu.exe File opened (read-only) \??\w: bbmdejvu.exe File opened (read-only) \??\r: bbmdejvu.exe File opened (read-only) \??\s: bbmdejvu.exe File opened (read-only) \??\y: bbmdejvu.exe File opened (read-only) \??\z: bbmdejvu.exe File opened (read-only) \??\m: ecbbkqxsny.exe File opened (read-only) \??\o: bbmdejvu.exe File opened (read-only) \??\t: bbmdejvu.exe File opened (read-only) \??\p: bbmdejvu.exe File opened (read-only) \??\v: bbmdejvu.exe File opened (read-only) \??\b: ecbbkqxsny.exe File opened (read-only) \??\k: ecbbkqxsny.exe File opened (read-only) \??\x: ecbbkqxsny.exe File opened (read-only) \??\y: ecbbkqxsny.exe File opened (read-only) \??\a: bbmdejvu.exe File opened (read-only) \??\j: bbmdejvu.exe File opened (read-only) \??\w: bbmdejvu.exe File opened (read-only) \??\g: bbmdejvu.exe File opened (read-only) \??\i: ecbbkqxsny.exe File opened (read-only) \??\t: bbmdejvu.exe File opened (read-only) \??\o: bbmdejvu.exe File opened (read-only) \??\h: bbmdejvu.exe File opened (read-only) \??\i: bbmdejvu.exe File opened (read-only) \??\q: bbmdejvu.exe File opened (read-only) \??\z: bbmdejvu.exe File opened (read-only) \??\u: ecbbkqxsny.exe File opened (read-only) \??\m: bbmdejvu.exe File opened (read-only) \??\r: bbmdejvu.exe File opened (read-only) \??\y: bbmdejvu.exe File opened (read-only) \??\l: bbmdejvu.exe File opened (read-only) \??\n: ecbbkqxsny.exe File opened (read-only) \??\s: ecbbkqxsny.exe File opened (read-only) \??\b: bbmdejvu.exe File opened (read-only) \??\k: bbmdejvu.exe File opened (read-only) \??\h: ecbbkqxsny.exe File opened (read-only) \??\s: bbmdejvu.exe File opened (read-only) \??\r: ecbbkqxsny.exe File opened (read-only) \??\p: ecbbkqxsny.exe File opened (read-only) \??\z: ecbbkqxsny.exe File opened (read-only) \??\u: bbmdejvu.exe File opened (read-only) \??\e: bbmdejvu.exe File opened (read-only) \??\e: ecbbkqxsny.exe File opened (read-only) \??\t: ecbbkqxsny.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ecbbkqxsny.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ecbbkqxsny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ecbbkqxsny.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4232-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ecbbkqxsny.exe autoit_exe C:\Windows\SysWOW64\qnzsbpmwqxjwkbq.exe autoit_exe C:\Windows\SysWOW64\bbmdejvu.exe autoit_exe C:\Windows\SysWOW64\apsvvavfelqqm.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
bbmdejvu.exe7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exeecbbkqxsny.exebbmdejvu.exedescription ioc process File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbmdejvu.exe File created C:\Windows\SysWOW64\ecbbkqxsny.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ecbbkqxsny.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qnzsbpmwqxjwkbq.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File created C:\Windows\SysWOW64\bbmdejvu.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File created C:\Windows\SysWOW64\apsvvavfelqqm.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\apsvvavfelqqm.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ecbbkqxsny.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbmdejvu.exe File created C:\Windows\SysWOW64\qnzsbpmwqxjwkbq.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bbmdejvu.exe 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe bbmdejvu.exe -
Drops file in Program Files directory 14 IoCs
Processes:
bbmdejvu.exebbmdejvu.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal bbmdejvu.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal bbmdejvu.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbmdejvu.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbmdejvu.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbmdejvu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe bbmdejvu.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe bbmdejvu.exe -
Drops file in Windows directory 19 IoCs
Processes:
bbmdejvu.exebbmdejvu.exeWINWORD.EXE7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exedescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbmdejvu.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbmdejvu.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbmdejvu.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbmdejvu.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification C:\Windows\mydoc.rtf 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe bbmdejvu.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe bbmdejvu.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe bbmdejvu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
ecbbkqxsny.exe7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FCFE4F5A82689045D75F7E93BD92E137594B6646623FD799" 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ecbbkqxsny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ecbbkqxsny.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462C7B9C5283226A3777D1772E2DDD7D8065AB" 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4FABAFE67F2E3830B3A4186963E96B38E03FC4362023EE1C5429B09D2" 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F168B7FF1B21DBD10ED0D68A0F9110" 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ecbbkqxsny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ecbbkqxsny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB2B12847E3399F53CBBAA73393D4B8" 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1845C67B14E4DAB0B8C07C92ED9134BC" 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ecbbkqxsny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ecbbkqxsny.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3148 WINWORD.EXE 3148 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exeqnzsbpmwqxjwkbq.exeecbbkqxsny.exebbmdejvu.exeapsvvavfelqqm.exebbmdejvu.exepid process 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exeqnzsbpmwqxjwkbq.exeecbbkqxsny.exebbmdejvu.exeapsvvavfelqqm.exebbmdejvu.exepid process 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exeqnzsbpmwqxjwkbq.exeecbbkqxsny.exebbmdejvu.exeapsvvavfelqqm.exebbmdejvu.exepid process 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 3436 qnzsbpmwqxjwkbq.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 1536 ecbbkqxsny.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 2128 bbmdejvu.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4696 apsvvavfelqqm.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe 4780 bbmdejvu.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3148 WINWORD.EXE 3148 WINWORD.EXE 3148 WINWORD.EXE 3148 WINWORD.EXE 3148 WINWORD.EXE 3148 WINWORD.EXE 3148 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exeecbbkqxsny.exedescription pid process target process PID 4232 wrote to memory of 1536 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe ecbbkqxsny.exe PID 4232 wrote to memory of 1536 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe ecbbkqxsny.exe PID 4232 wrote to memory of 1536 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe ecbbkqxsny.exe PID 4232 wrote to memory of 3436 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe qnzsbpmwqxjwkbq.exe PID 4232 wrote to memory of 3436 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe qnzsbpmwqxjwkbq.exe PID 4232 wrote to memory of 3436 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe qnzsbpmwqxjwkbq.exe PID 4232 wrote to memory of 2128 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe bbmdejvu.exe PID 4232 wrote to memory of 2128 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe bbmdejvu.exe PID 4232 wrote to memory of 2128 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe bbmdejvu.exe PID 4232 wrote to memory of 4696 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe apsvvavfelqqm.exe PID 4232 wrote to memory of 4696 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe apsvvavfelqqm.exe PID 4232 wrote to memory of 4696 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe apsvvavfelqqm.exe PID 4232 wrote to memory of 3148 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe WINWORD.EXE PID 4232 wrote to memory of 3148 4232 7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe WINWORD.EXE PID 1536 wrote to memory of 4780 1536 ecbbkqxsny.exe bbmdejvu.exe PID 1536 wrote to memory of 4780 1536 ecbbkqxsny.exe bbmdejvu.exe PID 1536 wrote to memory of 4780 1536 ecbbkqxsny.exe bbmdejvu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\ecbbkqxsny.exeecbbkqxsny.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\bbmdejvu.exeC:\Windows\system32\bbmdejvu.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4780 -
C:\Windows\SysWOW64\qnzsbpmwqxjwkbq.exeqnzsbpmwqxjwkbq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3436 -
C:\Windows\SysWOW64\bbmdejvu.exebbmdejvu.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2128 -
C:\Windows\SysWOW64\apsvvavfelqqm.exeapsvvavfelqqm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4696 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56da6380e11559fecca2de85f5ed991f9
SHA1ff899b710c9864f9c98d3110e3512f861f7f89f1
SHA256f5afca7689065a451652df58dcfccc55434e2cc13d6cf15fcb5f32bab41a9745
SHA5126cf1f47213379256b401cce04b7f34447f1cc71baf261859460920a76f3b3aaf2e5450fb0883e68d8eb4f200daf0e905c48573a7960310b10fadf280cb74e385
-
Filesize
512KB
MD514fd65f095ced585fdcf83ab90032465
SHA1006d1159e05e3d471104aa43bc7c35a019655336
SHA256bcf92507744184f9d18fd55be28fc4624b958b6591ee84c4f86ae9e0397e2511
SHA512b7af82d787124a8d25102c7819db29009a4b11818ddd84cdc9599a1167f56d070fb4b9023c33972cf1df2d83973d60f4843bd1451365704359a197dcf9bd3518
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD58063c9637c1ab37cd022fa2afa4971de
SHA1f9ff118a95e16b6eb588e49c5b31e15673abe537
SHA256487c636ff0d0c5fec9a23e348c4fdcfa8be8f121041283d6281ce8bd1bf7bd36
SHA5123a850632dcf5fb64b952760924470486d92c90ec5c43cbfc1245645d69ff66fc398fe85432f43d63bdfd861c7b752e00e347fb7e8a72f36eaf5de03127719eff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD512b8ed65834232ac7b984b7284a9d7f7
SHA1086ace55f501a5486ebf7acfdd0a9578783bec4d
SHA25628d1e8308f5191668867b9bef4cde60e46e04ab8fd13bd8242b769e411947d03
SHA5127eeadd48f0828c620524943430a6a72c92e22dfbd97e53dc51d81d35952322393c3e85a223dbc01244253867240f4b64d6eaa366f6dfe76b19dccac5215704eb
-
Filesize
512KB
MD59923fcc111de4ce107a7b73daec28e07
SHA1cc2ae12067a362ac41585cdc1231f7831ca06cc2
SHA256cb3f2f3d7ec57f53f85521ff840d7c516e306858c657776598a2965a9abaddaf
SHA51217cc3017fb39494eb817c580fe8d68ba91d7b3adec5fb43bc317f68a957c4068f3d60320ed605a0b01429d480364af145d850a62c05f6facf81425c4336127f6
-
Filesize
512KB
MD5219b4dc562abe98a7202a4b2c27fc3e5
SHA1a79acd90313bbdef79668a360c0687506098fbad
SHA256f6703dcea54cf267324ae07d875f1917ed62e1e14dd910cae622b12d2693175f
SHA512729bb869c2edabc3382a9ac48c1bba2cecefecdc585fcd61772925c138eb853f408b669e30baa336f03590e051be7b52bdfee5209ea8bea0fce3cbdcbf0e3019
-
Filesize
512KB
MD5d919db717d3c16b24fcb9b6b2bb83e56
SHA108c8b08530d5c84a77a33b34e02d206ae822cd9d
SHA256ae1c369a581721474447c4574e681b18d7dbfea1481d4c5a2531c2b0bdb6782c
SHA5120a5aed2c914be2c65745f54524f14677946d8a8cd6e3f966dc75c35e567ca773cea787c6f9ea4daaf305bcfa567c75a395bbad2812fc5ce3c491d84cfa2f7fdd
-
Filesize
512KB
MD58a7b208c90f3384f97469cfcc7a41ab0
SHA191aa55e80a3b96f73bd9dde0552b178758f4b3c0
SHA2565654dcf6737dba15c8ba0c8e55e92dddaa48ecdbfcb0d9a88c230ca6c9e67d4d
SHA51230a097fa9cf6effd15525810692d4c85891c9e42738ea7ac865ce67248129ee4d3a1aadf4b3d8af7eee06881a6e1cbf103a512b6a07f6be3772c2ace580d0700
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD52678f82454389330f0f392898272f412
SHA1a9ebf35059ba689c24615afd459bb6ad8eebb6a3
SHA256738e4a76f1ecb597cbbb60e1041852ec6aaa4af7a570cc0a3c5285fe7fef20f4
SHA51262a00438b9fbfaec634d0a0e02258ff2a25e447af24a8be31b19f7ff7b7d31f5b5c5db107c22eb05aab35745edd9893b7ac1a59109fc245014189ed9d52038b6
-
Filesize
512KB
MD5a1891103804078bffbe6a933c30fb1ed
SHA1c784ca0d8a5c01e2b185bf923b2a28243573eec6
SHA256775aaafbf8333da326b2d27dfcabeb31fa5745798904bcfa1802e15ecbdc69c9
SHA512e378472789574e13a6611e8bac72dcb48e2cc299e06285a1c13b969380709b47327159ff3978256a2e958fd74743199ee6cd41eea526d4ddc82e4af6289ef986