Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 05:08

General

  • Target

    7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    7800a1bda107b1aed0fc59d3b13da650

  • SHA1

    f7b349a94811c5baf83d6aa3fa52ebac65d7b193

  • SHA256

    1aa8b7af73650b36af91531936ca3b9270144f7433b8f74329bf8cdc6a4e3c3f

  • SHA512

    40aed307d0efe3cb57bcf8927002de30438a131a6b1cfa50c306a59e65a1bd04b4121be022d9cf8c6e4d9606eb1dc0f4f6100f187f936aa9f4c9aaa357d67a39

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6K:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7800a1bda107b1aed0fc59d3b13da650_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Windows\SysWOW64\ecbbkqxsny.exe
      ecbbkqxsny.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\bbmdejvu.exe
        C:\Windows\system32\bbmdejvu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4780
    • C:\Windows\SysWOW64\qnzsbpmwqxjwkbq.exe
      qnzsbpmwqxjwkbq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3436
    • C:\Windows\SysWOW64\bbmdejvu.exe
      bbmdejvu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2128
    • C:\Windows\SysWOW64\apsvvavfelqqm.exe
      apsvvavfelqqm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4696
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    6da6380e11559fecca2de85f5ed991f9

    SHA1

    ff899b710c9864f9c98d3110e3512f861f7f89f1

    SHA256

    f5afca7689065a451652df58dcfccc55434e2cc13d6cf15fcb5f32bab41a9745

    SHA512

    6cf1f47213379256b401cce04b7f34447f1cc71baf261859460920a76f3b3aaf2e5450fb0883e68d8eb4f200daf0e905c48573a7960310b10fadf280cb74e385

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    14fd65f095ced585fdcf83ab90032465

    SHA1

    006d1159e05e3d471104aa43bc7c35a019655336

    SHA256

    bcf92507744184f9d18fd55be28fc4624b958b6591ee84c4f86ae9e0397e2511

    SHA512

    b7af82d787124a8d25102c7819db29009a4b11818ddd84cdc9599a1167f56d070fb4b9023c33972cf1df2d83973d60f4843bd1451365704359a197dcf9bd3518

  • C:\Users\Admin\AppData\Local\Temp\TCD8EFF.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8063c9637c1ab37cd022fa2afa4971de

    SHA1

    f9ff118a95e16b6eb588e49c5b31e15673abe537

    SHA256

    487c636ff0d0c5fec9a23e348c4fdcfa8be8f121041283d6281ce8bd1bf7bd36

    SHA512

    3a850632dcf5fb64b952760924470486d92c90ec5c43cbfc1245645d69ff66fc398fe85432f43d63bdfd861c7b752e00e347fb7e8a72f36eaf5de03127719eff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    12b8ed65834232ac7b984b7284a9d7f7

    SHA1

    086ace55f501a5486ebf7acfdd0a9578783bec4d

    SHA256

    28d1e8308f5191668867b9bef4cde60e46e04ab8fd13bd8242b769e411947d03

    SHA512

    7eeadd48f0828c620524943430a6a72c92e22dfbd97e53dc51d81d35952322393c3e85a223dbc01244253867240f4b64d6eaa366f6dfe76b19dccac5215704eb

  • C:\Windows\SysWOW64\apsvvavfelqqm.exe

    Filesize

    512KB

    MD5

    9923fcc111de4ce107a7b73daec28e07

    SHA1

    cc2ae12067a362ac41585cdc1231f7831ca06cc2

    SHA256

    cb3f2f3d7ec57f53f85521ff840d7c516e306858c657776598a2965a9abaddaf

    SHA512

    17cc3017fb39494eb817c580fe8d68ba91d7b3adec5fb43bc317f68a957c4068f3d60320ed605a0b01429d480364af145d850a62c05f6facf81425c4336127f6

  • C:\Windows\SysWOW64\bbmdejvu.exe

    Filesize

    512KB

    MD5

    219b4dc562abe98a7202a4b2c27fc3e5

    SHA1

    a79acd90313bbdef79668a360c0687506098fbad

    SHA256

    f6703dcea54cf267324ae07d875f1917ed62e1e14dd910cae622b12d2693175f

    SHA512

    729bb869c2edabc3382a9ac48c1bba2cecefecdc585fcd61772925c138eb853f408b669e30baa336f03590e051be7b52bdfee5209ea8bea0fce3cbdcbf0e3019

  • C:\Windows\SysWOW64\ecbbkqxsny.exe

    Filesize

    512KB

    MD5

    d919db717d3c16b24fcb9b6b2bb83e56

    SHA1

    08c8b08530d5c84a77a33b34e02d206ae822cd9d

    SHA256

    ae1c369a581721474447c4574e681b18d7dbfea1481d4c5a2531c2b0bdb6782c

    SHA512

    0a5aed2c914be2c65745f54524f14677946d8a8cd6e3f966dc75c35e567ca773cea787c6f9ea4daaf305bcfa567c75a395bbad2812fc5ce3c491d84cfa2f7fdd

  • C:\Windows\SysWOW64\qnzsbpmwqxjwkbq.exe

    Filesize

    512KB

    MD5

    8a7b208c90f3384f97469cfcc7a41ab0

    SHA1

    91aa55e80a3b96f73bd9dde0552b178758f4b3c0

    SHA256

    5654dcf6737dba15c8ba0c8e55e92dddaa48ecdbfcb0d9a88c230ca6c9e67d4d

    SHA512

    30a097fa9cf6effd15525810692d4c85891c9e42738ea7ac865ce67248129ee4d3a1aadf4b3d8af7eee06881a6e1cbf103a512b6a07f6be3772c2ace580d0700

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    2678f82454389330f0f392898272f412

    SHA1

    a9ebf35059ba689c24615afd459bb6ad8eebb6a3

    SHA256

    738e4a76f1ecb597cbbb60e1041852ec6aaa4af7a570cc0a3c5285fe7fef20f4

    SHA512

    62a00438b9fbfaec634d0a0e02258ff2a25e447af24a8be31b19f7ff7b7d31f5b5c5db107c22eb05aab35745edd9893b7ac1a59109fc245014189ed9d52038b6

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a1891103804078bffbe6a933c30fb1ed

    SHA1

    c784ca0d8a5c01e2b185bf923b2a28243573eec6

    SHA256

    775aaafbf8333da326b2d27dfcabeb31fa5745798904bcfa1802e15ecbdc69c9

    SHA512

    e378472789574e13a6611e8bac72dcb48e2cc299e06285a1c13b969380709b47327159ff3978256a2e958fd74743199ee6cd41eea526d4ddc82e4af6289ef986

  • memory/3148-36-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-41-0x00007FFD7A570000-0x00007FFD7A580000-memory.dmp

    Filesize

    64KB

  • memory/3148-39-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-38-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-37-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-35-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-40-0x00007FFD7A570000-0x00007FFD7A580000-memory.dmp

    Filesize

    64KB

  • memory/3148-598-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-599-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-597-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/3148-600-0x00007FFD7C790000-0x00007FFD7C7A0000-memory.dmp

    Filesize

    64KB

  • memory/4232-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB