Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe
-
Size
512KB
-
MD5
82bbb881ba8bfbe390356d9f560322d5
-
SHA1
98bde3459c917e4b20148d40f57c226de05ef64e
-
SHA256
eca25bd5fe25c75b6a6ffcb997f68c327e8790956c3dd24e3464f75f441b8c67
-
SHA512
9f277c779d6f10973b94e0fbaeefad7077ab348ba2b3e4934dabf2c81ff5426e8059e33e479b6ad4a0d1a0b3545b8a70313157590210de1298d1b1c93cbdcdd0
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" uyjyqjdeqx.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" uyjyqjdeqx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" uyjyqjdeqx.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uyjyqjdeqx.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 4848 uyjyqjdeqx.exe 3640 rmhkmgrfgvndovt.exe 3424 hgefbkuo.exe 3224 pvccuwmhoesqg.exe 4536 hgefbkuo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" uyjyqjdeqx.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xfortfvi = "uyjyqjdeqx.exe" rmhkmgrfgvndovt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\popbemsm = "rmhkmgrfgvndovt.exe" rmhkmgrfgvndovt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "pvccuwmhoesqg.exe" rmhkmgrfgvndovt.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: uyjyqjdeqx.exe File opened (read-only) \??\m: uyjyqjdeqx.exe File opened (read-only) \??\v: uyjyqjdeqx.exe File opened (read-only) \??\k: hgefbkuo.exe File opened (read-only) \??\r: hgefbkuo.exe File opened (read-only) \??\i: hgefbkuo.exe File opened (read-only) \??\p: uyjyqjdeqx.exe File opened (read-only) \??\y: uyjyqjdeqx.exe File opened (read-only) \??\y: hgefbkuo.exe File opened (read-only) \??\n: uyjyqjdeqx.exe File opened (read-only) \??\e: uyjyqjdeqx.exe File opened (read-only) \??\b: hgefbkuo.exe File opened (read-only) \??\v: hgefbkuo.exe File opened (read-only) \??\u: hgefbkuo.exe File opened (read-only) \??\s: hgefbkuo.exe File opened (read-only) \??\h: hgefbkuo.exe File opened (read-only) \??\t: hgefbkuo.exe File opened (read-only) \??\k: uyjyqjdeqx.exe File opened (read-only) \??\o: uyjyqjdeqx.exe File opened (read-only) \??\q: uyjyqjdeqx.exe File opened (read-only) \??\t: uyjyqjdeqx.exe File opened (read-only) \??\g: hgefbkuo.exe File opened (read-only) \??\v: hgefbkuo.exe File opened (read-only) \??\b: hgefbkuo.exe File opened (read-only) \??\a: uyjyqjdeqx.exe File opened (read-only) \??\h: hgefbkuo.exe File opened (read-only) \??\p: hgefbkuo.exe File opened (read-only) \??\x: hgefbkuo.exe File opened (read-only) \??\g: hgefbkuo.exe File opened (read-only) \??\h: uyjyqjdeqx.exe File opened (read-only) \??\i: hgefbkuo.exe File opened (read-only) \??\e: hgefbkuo.exe File opened (read-only) \??\n: hgefbkuo.exe File opened (read-only) \??\s: uyjyqjdeqx.exe File opened (read-only) \??\q: hgefbkuo.exe File opened (read-only) \??\s: hgefbkuo.exe File opened (read-only) \??\g: uyjyqjdeqx.exe File opened (read-only) \??\z: uyjyqjdeqx.exe File opened (read-only) \??\j: hgefbkuo.exe File opened (read-only) \??\l: hgefbkuo.exe File opened (read-only) \??\o: hgefbkuo.exe File opened (read-only) \??\p: hgefbkuo.exe File opened (read-only) \??\o: hgefbkuo.exe File opened (read-only) \??\r: uyjyqjdeqx.exe File opened (read-only) \??\m: hgefbkuo.exe File opened (read-only) \??\j: hgefbkuo.exe File opened (read-only) \??\z: hgefbkuo.exe File opened (read-only) \??\u: uyjyqjdeqx.exe File opened (read-only) \??\z: hgefbkuo.exe File opened (read-only) \??\n: hgefbkuo.exe File opened (read-only) \??\x: hgefbkuo.exe File opened (read-only) \??\a: hgefbkuo.exe File opened (read-only) \??\r: hgefbkuo.exe File opened (read-only) \??\l: uyjyqjdeqx.exe File opened (read-only) \??\t: hgefbkuo.exe File opened (read-only) \??\w: hgefbkuo.exe File opened (read-only) \??\l: hgefbkuo.exe File opened (read-only) \??\i: uyjyqjdeqx.exe File opened (read-only) \??\j: uyjyqjdeqx.exe File opened (read-only) \??\a: hgefbkuo.exe File opened (read-only) \??\q: hgefbkuo.exe File opened (read-only) \??\m: hgefbkuo.exe File opened (read-only) \??\w: hgefbkuo.exe File opened (read-only) \??\y: hgefbkuo.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" uyjyqjdeqx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" uyjyqjdeqx.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3012-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00070000000233ba-5.dat autoit_exe behavioral2/files/0x00080000000233b6-18.dat autoit_exe behavioral2/files/0x00070000000233bb-26.dat autoit_exe behavioral2/files/0x00070000000233bc-32.dat autoit_exe behavioral2/files/0x0008000000023378-66.dat autoit_exe behavioral2/files/0x00070000000233c8-69.dat autoit_exe behavioral2/files/0x00070000000233d3-75.dat autoit_exe behavioral2/files/0x000e000000023422-544.dat autoit_exe behavioral2/files/0x000e000000023422-579.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification C:\Windows\SysWOW64\uyjyqjdeqx.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File created C:\Windows\SysWOW64\hgefbkuo.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\hgefbkuo.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File created C:\Windows\SysWOW64\pvccuwmhoesqg.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pvccuwmhoesqg.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hgefbkuo.exe File created C:\Windows\SysWOW64\uyjyqjdeqx.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File created C:\Windows\SysWOW64\rmhkmgrfgvndovt.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification C:\Windows\SysWOW64\rmhkmgrfgvndovt.exe 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll uyjyqjdeqx.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal hgefbkuo.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hgefbkuo.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal hgefbkuo.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal hgefbkuo.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hgefbkuo.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hgefbkuo.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal hgefbkuo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hgefbkuo.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hgefbkuo.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hgefbkuo.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hgefbkuo.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hgefbkuo.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification C:\Windows\mydoc.rtf 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hgefbkuo.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hgefbkuo.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hgefbkuo.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hgefbkuo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf uyjyqjdeqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" uyjyqjdeqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32462D089C2382566D4676A170222CDB7C8F65A8" 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCEFAB9F965F192837D3B4681993997B088038B4366033DE1B845E609D5" 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" uyjyqjdeqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" uyjyqjdeqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh uyjyqjdeqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc uyjyqjdeqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" uyjyqjdeqx.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0866BB3FE6B22DAD10FD0A88B7F9163" 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat uyjyqjdeqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" uyjyqjdeqx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" uyjyqjdeqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs uyjyqjdeqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg uyjyqjdeqx.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC3B12D4792399D53CCBAA033E9D7C9" 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8EFCF8485A8512903DD6207DE7BDE5E13D59426644623FD7EA" 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193FC67E14E2DAC0B8C17CE9ECE434BD" 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3996 WINWORD.EXE 3996 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 4848 uyjyqjdeqx.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3424 hgefbkuo.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3640 rmhkmgrfgvndovt.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 3224 pvccuwmhoesqg.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe 4536 hgefbkuo.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4848 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 82 PID 3012 wrote to memory of 4848 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 82 PID 3012 wrote to memory of 4848 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 82 PID 3012 wrote to memory of 3640 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 83 PID 3012 wrote to memory of 3640 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 83 PID 3012 wrote to memory of 3640 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 83 PID 3012 wrote to memory of 3424 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 84 PID 3012 wrote to memory of 3424 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 84 PID 3012 wrote to memory of 3424 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 84 PID 3012 wrote to memory of 3224 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 85 PID 3012 wrote to memory of 3224 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 85 PID 3012 wrote to memory of 3224 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 85 PID 4848 wrote to memory of 4536 4848 uyjyqjdeqx.exe 87 PID 4848 wrote to memory of 4536 4848 uyjyqjdeqx.exe 87 PID 4848 wrote to memory of 4536 4848 uyjyqjdeqx.exe 87 PID 3012 wrote to memory of 3996 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 86 PID 3012 wrote to memory of 3996 3012 82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82bbb881ba8bfbe390356d9f560322d5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\uyjyqjdeqx.exeuyjyqjdeqx.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\hgefbkuo.exeC:\Windows\system32\hgefbkuo.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4536
-
-
-
C:\Windows\SysWOW64\rmhkmgrfgvndovt.exermhkmgrfgvndovt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3640
-
-
C:\Windows\SysWOW64\hgefbkuo.exehgefbkuo.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3424
-
-
C:\Windows\SysWOW64\pvccuwmhoesqg.exepvccuwmhoesqg.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3224
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3996
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5c5a0995c5151b2de2ce723f595bdca12
SHA18c1accd82955d074d1377e3ecb8cf673d767101e
SHA256c7499969ba8427a0d8b0bf998cf62645441e68d98c541bf4723b7782aa6a37f3
SHA51298b31edaf84df3ced627774f33ab6a3d7d969fb0faef63001fb0e8cd3e709c3637c08aa8817a9c73cd61be9fc3ab90475ce71ca244ba29de417bc3b4ca217682
-
Filesize
512KB
MD5f29652738876d0f3763eeec6b8006a7a
SHA170730f43a5816f867d0995be3a5ccfbb49ab4233
SHA256cdcd8dc79074f027e4395ae19e63458c4f4e77af24531934c9064be80dae0585
SHA5127a5c9cb09249b8a93b67202f11c6b9edfb3380bbaa6f96dd2b9283c108858b1b68564035d418affbc06cec1ef75311a6080d46b03bfda64756b67342f78fc43d
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
239B
MD51459a67e7603529e2bd4067a2a106783
SHA150364cbc787a8be7195e9f7847e1087a8426f3d7
SHA256c989778e2fd3711e7ec2d1578a84da327ba9ef65015084c9f4fcf3e4c9e1a9cc
SHA512b21324f7d9bbb59a64f178c735dd70496629ad0a08b2b5a6eee2346664104b03c13805102347cf5263f8b2e797f08fadaec01e231bc2db1f7716e1f7b257c373
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD568aa7032c2113f5340c375e6e536aaae
SHA17e169412c95a9eeb3fc2c8eed038625d4d02d1bd
SHA256d95b7aa78ab2ad1cb058b6f7891f136cd1ace70c5dd11b163f0d7be1815a8ec5
SHA512184682e269735963f58955eb9c14a9d1b0c12035ed5e43a671da4945c7d1538b58a9356ef005a4456bb2e2c5afcc01b9f518884c2ad1ce9b0d9cef62fcc517bb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD508c854c6ef1ec1f1f5bb224074868667
SHA10785083b296ed09e569d0e313e6cfdcd6bb1650e
SHA25640d51bd539cad7ebb5f61aea4015a5d9258ca467e4870848934754d3d333c773
SHA5124a5070370a855d2c91be5f25c9b99c93a411558efaee4c06c86b03c7b6b0a8bdcf20a5e73eb3166ad9901399735ee9ad8c652a6abbd7ea9ae6c6d5ead833612f
-
Filesize
512KB
MD541e6f5b7b5b59b969e966fa11d156a3f
SHA19999f7f19cab2e88b2a22fda0292f2b6daccacfc
SHA2561cf748e88797613166b964dfbdda579c28be1509ce106f34b38924fef2440f92
SHA512f498e9b1c5c96394e749d68bb8bae9471432f8ed4135c4213cfeca845cdd259487f79cab593fe7e525d3f7a00af280806cdeae1149736b65eb8c9393b5c8bf1e
-
Filesize
512KB
MD5e48500a6d4244ca5ae7f1b9a7b1441a1
SHA1fbee5efa25c0f1d154672e9c55a5258c44ece407
SHA256e4377f87072f1a530cac6d96cfa0182a696f6b671d335a6fd4b1c0fc13469014
SHA512625a47f94b442bd413db869caf6d5f342ad8d79f5e659ef0d3ff1ccc4f301725d9c00fe6983d67a4f45c6b3600342be0df4b4aa864a17a0fb6260144149cf525
-
Filesize
512KB
MD5c363cfe4a38bd914d59afb73d78bda34
SHA113303129d48d0dfbaaa0a6dffe3ef036f5fb7cff
SHA2560f5157d7a3163506b0be9cf7d883c1d08fc2d96fb036da2b7f82a15af5e246b7
SHA5126453451d4b2835c3967a06700959da3bb676b6c85295898ebd97af7e37836a4f0978fff46d2f8d7c4d4d6a5533a5b4628603c4005f9532cd48ca5660b0ae45d6
-
Filesize
512KB
MD5ae0a643f62df3123b0da33d0c13139ae
SHA1f2cd659702387bf5579164883daaa646ff43e9ce
SHA256c42e8297a16f28b7fd43bb8d0cc3ed9858cae6873e47d8a258caec4a881f8db8
SHA512302a3ff51630e14b89e796cbd8e25f7e5259bf625892c8e54c5521c47833d1c9e016fef2d9ba85f7965c516c2fe7c174e004746cac484908b6ddb97f3cbda6be
-
Filesize
512KB
MD5402fc5af15ba8d9d11ca6afd5a05dba4
SHA1bb39d681b13ecfd3753965cde6406cc4dae011cd
SHA25665a96345a859ea77ac15e3aee931900d2f79688c7bebb0638c36612d2ac83f0c
SHA512cdd8e69cb75dd30ded18ebab94f9a770251bd6237550608ff94fd6a3df902e8b57bcfc7afaf53f6bcac85453e91061d37d5394b791580d390a0654870a7d4a65
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD568e692f075fa9d358dd642c17952450d
SHA19fcd38a9eb4afe8b17c40d02a0a4ef770dcfff60
SHA256aa862c7b783758959f1bb4efe0f29efdf149674583fb91f8d41e19c857677d9d
SHA512490b016744b646268340ee3103214dcacfa86bd17097d24e2da33de2d4a5297bbdd906927c92f6d61c7d3cc8df83077d736b050a65ffd0e61978353cece5f823
-
Filesize
512KB
MD5bf364d2246ba2cd745529926c63a6e72
SHA177143de9968e23e84c36bacca497ad37ee37b1c3
SHA2562d41657b2b623afefcf85173fab473bcdf846220e5475e850d284550352cbdcb
SHA51283b704146e5bb934dfdf8ce119bdb7e266501bb424fc6e6612add978baaef454d7489eff03a08423472b4bdf7a1f7e5973869e08423b94d025ffb60f021482ee