Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 14:24

General

  • Target

    7d48f64289fcefd49eed1118d6aecd46_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    7d48f64289fcefd49eed1118d6aecd46

  • SHA1

    4bda1e89fd37ff2828a55b5a0c9e2e27678763d4

  • SHA256

    58e2fd5aa91aa0db73cb213fcc16a9d358682a2bc62e51d71d9122a509a4f58d

  • SHA512

    50f69cdf51716b9dbeed7a90850ab48e4a87615395c012409c84028d19bbfd94dbed1340dd17d04878f7c0d758040ac1f2b7deb0fc906906df60ee85125933a9

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5/

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d48f64289fcefd49eed1118d6aecd46_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7d48f64289fcefd49eed1118d6aecd46_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SysWOW64\vsmwemrjig.exe
      vsmwemrjig.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\SysWOW64\giwnkswz.exe
        C:\Windows\system32\giwnkswz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5432
    • C:\Windows\SysWOW64\ybavqkfdygqgvxf.exe
      ybavqkfdygqgvxf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1924
    • C:\Windows\SysWOW64\giwnkswz.exe
      giwnkswz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4972
    • C:\Windows\SysWOW64\ikdwvmjcjissv.exe
      ikdwvmjcjissv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1952
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5424
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4472 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      54371674915ed187aa61230630049da2

      SHA1

      8d49a23f521bc2149f3a6963688ecb3bd2782f1d

      SHA256

      5bd38df66ea7263555c24250b3b9f9584e1e2e823752606be07ecfe5ead96c86

      SHA512

      f730a49e1290e09b4a7362cb4e1e8768dcfc976b5b4bfae13a930d0ab199f6568eda7347bf18a655240d788d11c74605f6f4655e6ab519acdf31c78f2dc43180

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      c76c084eee2c4444609b23b7ff96b537

      SHA1

      58575e5a3ca5a1e82929a9503a1e9e6553c93c56

      SHA256

      c0c3ce20dd7bd02654d154b1c4b9704c02006ba65f5415e3a8dfab62df6e18dd

      SHA512

      263a612b0bc3f5a490800326b0730343b5de19452fda5b1af6752ed36d0e57f3b7d0800f967eb3b0dae81dfecd46e61f81dcccb9ea162ba9ccd15600cd95194e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      8a9b2cb3aa36ff16e6403847ec43fb68

      SHA1

      1942f2446d8997322f26c09cb13fe6bec6f04016

      SHA256

      aab0c146c274f465e1639c8dc665cf6185a33d2673ff872df7634e3f2b8e6c48

      SHA512

      307ed49fb85ef434ae561890d931f61b6c5c93470b65b8a2559523146b6019cb767c46c3eec406e68d7f8699ea0d311e568c659315018ad61373419e8fff4f29

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      2e14127e2080d276d116321cc334a81b

      SHA1

      247b3b64008617c308eaf183cb6d44795ab82946

      SHA256

      e477c6d63190f0bc6cb0e0a057feaa9013bb888696e988974b79bd2eeb60f333

      SHA512

      6113478ef45b4e4480a762e59920d1be0953dca511da0552910ce86d5846ef536d444c88d4236bc2a90119a602f21cad33573ea79229d401f54d8e41f287d071

    • C:\Users\Admin\Downloads\ClearConvertFrom.doc.exe

      Filesize

      512KB

      MD5

      46834b12023290d8e1cb06bed3841777

      SHA1

      9e1fdc9bf5fd79b8513f225dc4dc4f25bebef06f

      SHA256

      0f550134fb32e4ad76144290c7bce69de02636cefcc5e14801a9ea72298a703d

      SHA512

      075d1664e4dd51b817487c1f81a81a876f99e96971aa125f40d0d8821bebfd003a3eb1644f52849ded1ed8b94cd158e2526486e24c95043b303278d872bf78ea

    • C:\Windows\SysWOW64\giwnkswz.exe

      Filesize

      512KB

      MD5

      d3584fedec48c87555561ac02eebcaa2

      SHA1

      d69951e7cf3993a01998d20d8e3b6b901507efe1

      SHA256

      bfa1a9e7460e7aa3cce26189409e75d2ecead72edf2c808920a478da2119480b

      SHA512

      4a716e99c29b1786eea610aa5ceda480c5d4242cae1f31cfa373359623b9111a7c964e0c472af3663075e794c1d6f7d3694405148f837b925358a9d31e413282

    • C:\Windows\SysWOW64\ikdwvmjcjissv.exe

      Filesize

      512KB

      MD5

      6db4edd5259c91ac4e9d0e18701c75da

      SHA1

      d35a2de2f81fdec1970465bce86303c009bcf491

      SHA256

      a86a5dd0854f7a116aa121b76dfd5120a6d70bd605ddf3b5cd4207a1da2fe50b

      SHA512

      54fbf6733f636767fdbdf851bf12614d8146a870ae633ef56956a5bb6ff8bb9449d78dfc2073af1cba4588e428a486c9421f1b0c92bb74411d8e88029ce5ccc5

    • C:\Windows\SysWOW64\vsmwemrjig.exe

      Filesize

      512KB

      MD5

      b2b02bd1c6729b2e7adf2035477177b4

      SHA1

      79b6199598e51bd09b7bff38b1f839e89a70fd1d

      SHA256

      299376fbfb9a06319d0c7a224f1c8e28a87655fee725eaf5951452e83323fb95

      SHA512

      a4b00f2ce32c7b36ab30c0c369d4b95a6f19329672a9e0ff72019c306d9ab46c79886a8d990eb46cc782a5a2b5e21022eddf196d2088c7fbf682275affe88c75

    • C:\Windows\SysWOW64\ybavqkfdygqgvxf.exe

      Filesize

      512KB

      MD5

      f1c7e8b4dc2c1ab41129e32980f58151

      SHA1

      edfade2ea84a94f32a388614faf1a14ff0a778b5

      SHA256

      389a9dbb9483fea7eab4012a799fbd4b1e72f9e5b5b9a17956fc3b056e9eab5f

      SHA512

      5bea08884edba9334e883c8d4df31f9f935458010f4a4bc2a89fcda697587a69cf1ade80900902fa8bac62ff2e54b22c2c39e8940950683c155a2a85ca93ecfd

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      e0977a803dbcb4a7656750788ce171f5

      SHA1

      d7c867a40e534a9d84c36c0f561a0eb691787237

      SHA256

      3372c79a11a210ffaa41af501d873a19c9aa2fe6696484bb55644ecd59cbadec

      SHA512

      25c67a959a21df721597c39792d7d91a7f219981140cefb5f6fc0539eafeb78c8880e106b25d8b755d3de624fc1f60cac0df7d2d30918bde3984388f7fe0ed1c

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      f43ba663b9b9eec3cf1e5717dfed0cff

      SHA1

      a4828c64ef96fa0e0539584efd9470f88f4fb9eb

      SHA256

      0bd13120aa20a957385fb802eeb3f2465c3c728c283ce38f1df3c7637f260954

      SHA512

      b1a18f65dc6a93645c927582c56b4b48f500e24d61f00e5e87f41dd3be139b2135fc48cd1b36dad7206ebeed49ec4e76a920a40bb94274e00ce7759c0dc0f959

    • memory/4620-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/5424-39-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-40-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-38-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-37-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-43-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp

      Filesize

      64KB

    • memory/5424-41-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-42-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp

      Filesize

      64KB

    • memory/5424-116-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-117-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-119-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5424-118-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB