Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe
-
Size
512KB
-
MD5
781520476d4361be5ce19d1eeaeb3b5f
-
SHA1
9e974df0304e65d615a1a7be1c2fb691285350e0
-
SHA256
c20ea11f0588f74fd9116cdc7f8828130a8120d446f91d9a66fa7603af7f7d9c
-
SHA512
841c9f7503718ae09e0c9ea515c69b82e20bd023d01cadaba4ed5d89deb12195da7babae293f1f63ee7df622f6e5c04339cb54f5e38d656e3e3b692f64141897
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6d:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5A
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
quktmipgtn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" quktmipgtn.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
quktmipgtn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quktmipgtn.exe -
Processes:
quktmipgtn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" quktmipgtn.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
quktmipgtn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" quktmipgtn.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
Processes:
quktmipgtn.exeqyfigxtvwlfowhk.exevnrqfoom.exeairnqxfjjmevr.exevnrqfoom.exepid process 3144 quktmipgtn.exe 4592 qyfigxtvwlfowhk.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1640 vnrqfoom.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
quktmipgtn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" quktmipgtn.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
qyfigxtvwlfowhk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ogxhjyxz = "qyfigxtvwlfowhk.exe" qyfigxtvwlfowhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "airnqxfjjmevr.exe" qyfigxtvwlfowhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\slitqtmz = "quktmipgtn.exe" qyfigxtvwlfowhk.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
quktmipgtn.exevnrqfoom.exevnrqfoom.exedescription ioc process File opened (read-only) \??\k: quktmipgtn.exe File opened (read-only) \??\p: quktmipgtn.exe File opened (read-only) \??\h: vnrqfoom.exe File opened (read-only) \??\v: vnrqfoom.exe File opened (read-only) \??\k: vnrqfoom.exe File opened (read-only) \??\n: vnrqfoom.exe File opened (read-only) \??\b: quktmipgtn.exe File opened (read-only) \??\e: quktmipgtn.exe File opened (read-only) \??\n: quktmipgtn.exe File opened (read-only) \??\w: quktmipgtn.exe File opened (read-only) \??\b: vnrqfoom.exe File opened (read-only) \??\t: vnrqfoom.exe File opened (read-only) \??\x: vnrqfoom.exe File opened (read-only) \??\r: vnrqfoom.exe File opened (read-only) \??\o: vnrqfoom.exe File opened (read-only) \??\g: quktmipgtn.exe File opened (read-only) \??\l: quktmipgtn.exe File opened (read-only) \??\u: quktmipgtn.exe File opened (read-only) \??\x: quktmipgtn.exe File opened (read-only) \??\y: quktmipgtn.exe File opened (read-only) \??\a: vnrqfoom.exe File opened (read-only) \??\u: vnrqfoom.exe File opened (read-only) \??\z: vnrqfoom.exe File opened (read-only) \??\g: vnrqfoom.exe File opened (read-only) \??\g: vnrqfoom.exe File opened (read-only) \??\m: quktmipgtn.exe File opened (read-only) \??\v: quktmipgtn.exe File opened (read-only) \??\m: vnrqfoom.exe File opened (read-only) \??\b: vnrqfoom.exe File opened (read-only) \??\j: vnrqfoom.exe File opened (read-only) \??\s: vnrqfoom.exe File opened (read-only) \??\x: vnrqfoom.exe File opened (read-only) \??\z: vnrqfoom.exe File opened (read-only) \??\u: vnrqfoom.exe File opened (read-only) \??\w: vnrqfoom.exe File opened (read-only) \??\p: vnrqfoom.exe File opened (read-only) \??\e: vnrqfoom.exe File opened (read-only) \??\s: quktmipgtn.exe File opened (read-only) \??\t: quktmipgtn.exe File opened (read-only) \??\e: vnrqfoom.exe File opened (read-only) \??\i: vnrqfoom.exe File opened (read-only) \??\n: vnrqfoom.exe File opened (read-only) \??\a: quktmipgtn.exe File opened (read-only) \??\i: quktmipgtn.exe File opened (read-only) \??\z: quktmipgtn.exe File opened (read-only) \??\k: vnrqfoom.exe File opened (read-only) \??\p: vnrqfoom.exe File opened (read-only) \??\j: quktmipgtn.exe File opened (read-only) \??\l: vnrqfoom.exe File opened (read-only) \??\o: vnrqfoom.exe File opened (read-only) \??\q: vnrqfoom.exe File opened (read-only) \??\y: vnrqfoom.exe File opened (read-only) \??\a: vnrqfoom.exe File opened (read-only) \??\l: vnrqfoom.exe File opened (read-only) \??\w: vnrqfoom.exe File opened (read-only) \??\o: quktmipgtn.exe File opened (read-only) \??\q: quktmipgtn.exe File opened (read-only) \??\h: vnrqfoom.exe File opened (read-only) \??\m: vnrqfoom.exe File opened (read-only) \??\y: vnrqfoom.exe File opened (read-only) \??\s: vnrqfoom.exe File opened (read-only) \??\q: vnrqfoom.exe File opened (read-only) \??\r: quktmipgtn.exe File opened (read-only) \??\i: vnrqfoom.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
quktmipgtn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" quktmipgtn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" quktmipgtn.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/656-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\qyfigxtvwlfowhk.exe autoit_exe C:\Windows\SysWOW64\quktmipgtn.exe autoit_exe C:\Windows\SysWOW64\vnrqfoom.exe autoit_exe C:\Windows\SysWOW64\airnqxfjjmevr.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exequktmipgtn.exevnrqfoom.exevnrqfoom.exedescription ioc process File created C:\Windows\SysWOW64\vnrqfoom.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll quktmipgtn.exe File created C:\Windows\SysWOW64\quktmipgtn.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\quktmipgtn.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File created C:\Windows\SysWOW64\qyfigxtvwlfowhk.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qyfigxtvwlfowhk.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vnrqfoom.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File created C:\Windows\SysWOW64\airnqxfjjmevr.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\airnqxfjjmevr.exe 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe vnrqfoom.exe -
Drops file in Program Files directory 15 IoCs
Processes:
vnrqfoom.exevnrqfoom.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vnrqfoom.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal vnrqfoom.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vnrqfoom.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vnrqfoom.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vnrqfoom.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vnrqfoom.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vnrqfoom.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal vnrqfoom.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal vnrqfoom.exe -
Drops file in Windows directory 19 IoCs
Processes:
vnrqfoom.exevnrqfoom.exe781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification C:\Windows\mydoc.rtf 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe vnrqfoom.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe vnrqfoom.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe vnrqfoom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
quktmipgtn.exe781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc quktmipgtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" quktmipgtn.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" quktmipgtn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh quktmipgtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" quktmipgtn.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32422D7D9C2282206A3176A077262CD97CF364D7" 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4F9BDF96BF190830C3A32819F3E97B38802F843150349E2C942E808A1" 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf quktmipgtn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs quktmipgtn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg quktmipgtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" quktmipgtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B15D449738E353C8BADD329AD7CB" 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC60F1493DAB3B8CE7F92EC9637BC" 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat quktmipgtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" quktmipgtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FF8E4F5D851F9040D62F7D93BDE7E141594A67426241D6ED" 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F26BB9FE6D22DCD108D1D18A749060" 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" quktmipgtn.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1768 WINWORD.EXE 1768 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exequktmipgtn.exeqyfigxtvwlfowhk.exevnrqfoom.exeairnqxfjjmevr.exevnrqfoom.exepid process 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 2516 airnqxfjjmevr.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exequktmipgtn.exeqyfigxtvwlfowhk.exevnrqfoom.exeairnqxfjjmevr.exevnrqfoom.exepid process 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 4592 qyfigxtvwlfowhk.exe 3144 quktmipgtn.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exequktmipgtn.exeqyfigxtvwlfowhk.exevnrqfoom.exeairnqxfjjmevr.exevnrqfoom.exepid process 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe 3144 quktmipgtn.exe 3144 quktmipgtn.exe 4592 qyfigxtvwlfowhk.exe 3144 quktmipgtn.exe 4592 qyfigxtvwlfowhk.exe 4592 qyfigxtvwlfowhk.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1028 vnrqfoom.exe 2516 airnqxfjjmevr.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe 1640 vnrqfoom.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1768 WINWORD.EXE 1768 WINWORD.EXE 1768 WINWORD.EXE 1768 WINWORD.EXE 1768 WINWORD.EXE 1768 WINWORD.EXE 1768 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exequktmipgtn.exedescription pid process target process PID 656 wrote to memory of 3144 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe quktmipgtn.exe PID 656 wrote to memory of 3144 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe quktmipgtn.exe PID 656 wrote to memory of 3144 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe quktmipgtn.exe PID 656 wrote to memory of 4592 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe qyfigxtvwlfowhk.exe PID 656 wrote to memory of 4592 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe qyfigxtvwlfowhk.exe PID 656 wrote to memory of 4592 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe qyfigxtvwlfowhk.exe PID 656 wrote to memory of 1028 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe vnrqfoom.exe PID 656 wrote to memory of 1028 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe vnrqfoom.exe PID 656 wrote to memory of 1028 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe vnrqfoom.exe PID 656 wrote to memory of 2516 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe airnqxfjjmevr.exe PID 656 wrote to memory of 2516 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe airnqxfjjmevr.exe PID 656 wrote to memory of 2516 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe airnqxfjjmevr.exe PID 656 wrote to memory of 1768 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe WINWORD.EXE PID 656 wrote to memory of 1768 656 781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe WINWORD.EXE PID 3144 wrote to memory of 1640 3144 quktmipgtn.exe vnrqfoom.exe PID 3144 wrote to memory of 1640 3144 quktmipgtn.exe vnrqfoom.exe PID 3144 wrote to memory of 1640 3144 quktmipgtn.exe vnrqfoom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\781520476d4361be5ce19d1eeaeb3b5f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\quktmipgtn.exequktmipgtn.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\vnrqfoom.exeC:\Windows\system32\vnrqfoom.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640 -
C:\Windows\SysWOW64\qyfigxtvwlfowhk.exeqyfigxtvwlfowhk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4592 -
C:\Windows\SysWOW64\vnrqfoom.exevnrqfoom.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028 -
C:\Windows\SysWOW64\airnqxfjjmevr.exeairnqxfjjmevr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2516 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1768
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD55a6fc8c71f09ca4b3f9375c94fc80bc4
SHA1b14d9d261829c0a9e1bfa7e1a728a86e0d3abfb9
SHA25602c920f189bd3e22921c709bf561a232e632306e7be41724a5e927b5f97f1d02
SHA512b5c8eb071560d751f87e8fc8405ae968e45977b4eba3b6838499e4bab05980ae750f413f7954d3cbf55a1027dcbc70efc3e526c987267c1d94b8785a9019c617
-
Filesize
512KB
MD56f338a620baa71589add7675f348c951
SHA10c1386ccdb7d68f392c43729794db66f18b8da25
SHA2564306bf0b933cbf535db6db254554643ae3cf54b367653693a0efb0bc05fade8d
SHA512d1845f55da801206e24e556c03001ccf2b85447522c563380fd66025289d7fac1e7912a5fda210b6026cdb463d6f9013f1356199695afef12d2e4e642b5ea44a
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD58555d8d550e6ffcf4ea7de39ddef9406
SHA13e91f59ae24ccd2519e8e17a659d5c0e583a6edf
SHA256a198c5465e81f3fbbf6dbbcabded5cc5d7b95cc768fd3877398047b7ad9295a6
SHA5123ad643a0e7eb68f463b087274d3e8bc8cf49668740bec8e195b18163c63128a80df7415437901e5f85142aec80bf256bfd3307805b3b5c02a471143ae7bffca6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD573f0bbbe93ac8eecdb72707a43c6361f
SHA143ca56fc0c423d2fc546620b87239d9f7653fec8
SHA2560d6e7d19924ff2fd5a6d19b9edd89664ec4907277dfb5d3dc1b30a7e6ba476ce
SHA512834f446c6d8644001416d87ea69fbbab60f66d565282f0eb8e96572d88e74f1818caab8fd8293a39119449ced12321a7d6ee24ce15b0b13b1655f305ba6e0d3a
-
Filesize
512KB
MD5f1f8cc8b4abcacb8803d48e708a5e797
SHA1c9f4f80ce1825e71ebee9534aaa3a9bf61a73fed
SHA2565716399f2b61f396a4f98a90c0172ebfe2bc54e6b5c00675f77638c4638278a3
SHA512cd2ff1dc0e9ae0ae220f819ecd715589352e006a3dd98a9e14ef418ec14ae05f679653c1ec2bf2f3f39597b080a9b953a7a98f66e4b76b65a929dd8d4dc9f609
-
Filesize
512KB
MD55c86fee21a702d670121d97e7429303b
SHA145b854123e76fadc2a1d12ff863944abc7c58b30
SHA256e236458155ce4cea1bcb5ce5edc6ecc4c8dbe40898d3bd6b32ac5d57d28ef6f7
SHA512267a725a00a48793336599606d78d1cc7694cce34d05dddf12d5afbfba6a645a94d10bf4e45349d85dcd411ebda9216548e14a968e12a935314ddd946f38befb
-
Filesize
512KB
MD562bdf888f6300ab1df6559b7cb7d5e85
SHA1a9623c6059300989c91ee247f41e865509a18975
SHA256a4b5848819847372dafe6516153287428176ca4a209b76542db20af31471471a
SHA5129e853fb68341d69ab5106e9382141d471edaabc01dc87f22c7c9f1479f0901438a68edba625cfe33e6496203c1736128171032ec5266aa3b92c8633ba64918c4
-
Filesize
512KB
MD5f208b9985a603bf594e4194f5dfe5560
SHA1d6099f8103eaf4e15a43ae55c3578c8d7ef90630
SHA256af7007bbd5c61f4ec686b0f831687c655a9796027b1bc64ae2578ad7fcc74bcd
SHA5121688407d8c819e55fb5a9b4416cf7328e3a3a133486cf15f5f103ac0930f59d5c95897f9d524731d1d4d802b3094d60174be61d248276b7295ee9b572120670e
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5f46f0327cc90a3619c6f34c80ac14ff5
SHA100089980f2ac31209ac9c0150ebf7cb27bb10af6
SHA25604da36088252a75987fc2fdfedd2246b9788598f6968b2ecb0520b5b4b19c996
SHA512598c8ba7e4383eb5b508a7c197066858cd486b077570b379215076bff685df37809f3992e0425b75026fa8c0d1f817a5dc9ac130ec0d00f50b4f4b4493046cc1
-
Filesize
512KB
MD53108756388da70eb2f0641071f07d903
SHA148a37063c0d0b933306b788a41f6074def40142d
SHA256912c1c62daf6ffecd826fc0db2416b30f0c692659e9192e3351d529c84414637
SHA512654a042a0f6fbaa54db5e74242146b3f08433bc754fbd4bab32d1559e1695126d6838ace14635d729031b9dc0ed2ef87fcc71d1601fc4c591e93011d947a3ea5