Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 16:43

General

  • Target

    84cfa75bf402275543aa730ab09c867c_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    84cfa75bf402275543aa730ab09c867c

  • SHA1

    84d96fc16538c0b3da88218a4419164ab2c468ed

  • SHA256

    1cc8b17b0b79b715a3f088d581b1109cfd1fdae2d5000c6d7396db5c681e2b57

  • SHA512

    2e88008c5edccf65fdcdd61f03d20e8ab8882b8501d05e28176736f89aa05c68a33a0d2d5b9333be47388a1a8e99e47dd12210306e7a2f582cb2ea4cf9581979

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6C:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Z

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\84cfa75bf402275543aa730ab09c867c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84cfa75bf402275543aa730ab09c867c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\rbrzgooznd.exe
      rbrzgooznd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\SysWOW64\anfdocdx.exe
        C:\Windows\system32\anfdocdx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2772
    • C:\Windows\SysWOW64\bfsnpotrgygsbem.exe
      bfsnpotrgygsbem.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2932
    • C:\Windows\SysWOW64\anfdocdx.exe
      anfdocdx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2636
    • C:\Windows\SysWOW64\ksnlbctlmxwrf.exe
      ksnlbctlmxwrf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2624
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2704
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    da4f8822e80def7f58aace44a54af790

    SHA1

    ab4e397e87bc0afe5ee7d434eadabc4745f64acf

    SHA256

    162412477c7050f51214afad7fb094563ddf4ff73c6d11c2d34a13fdfd3274e7

    SHA512

    80dcafcc7152b89874bbd66e5ddcd4d19a99fd69c76f4cf56b8fd2da783828d516b070f16adcdc77923e2067d01ed83aead72982696f0b5c491a5099d6a89884

  • C:\Windows\SysWOW64\bfsnpotrgygsbem.exe

    Filesize

    512KB

    MD5

    5746cb43e1568071a8eea1bcf523464e

    SHA1

    9473bb20656b578db9fea5a4d38a9898e01674e5

    SHA256

    e04ec5dad86ced64840f37a1774746600f4217cb561886c78403220f6a5d033e

    SHA512

    136550acba87406ae065ec9ecd047c9a6c87340814fd9ee71f1fb6b25a4556947b273ad1a2bd10ebd1d597d4dadece8786b8051331b248b0970f5e5fdf793b52

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \Windows\SysWOW64\anfdocdx.exe

    Filesize

    512KB

    MD5

    0d4c925d2447f27c4e4726ff367e71e1

    SHA1

    ce2b4111468bbc6e19a073d51ebbaa99cc95f87a

    SHA256

    bd1b871e84a02c6b6682b646e155ba5937b7edca77a53fb6bc1e64ce0a079b3f

    SHA512

    875460d6089d368110df428fbb02d11cd246c8c8139c660799f7dd58011fffd907e92175f2964dfb7cb5e267e140c89b89d7f53c44decfa8783b1151a9e5e962

  • \Windows\SysWOW64\ksnlbctlmxwrf.exe

    Filesize

    512KB

    MD5

    0ba4543963d53307275f0b7dbff3c762

    SHA1

    8e7b1f55159e73b6b2e38da0d6e160cbccb1084e

    SHA256

    23e6acd66b463fe8fad158d1f246c6e75ab2274f47e0ca0b9cfaeac2c8475667

    SHA512

    76048f4d19f15a718ac33db162db491cb5fcbfa0d084c93885ada10a16d9173217355660e9b4b9fcec07418e921a697b2d2ccda666e88becb9dc33e3ccdb2c45

  • \Windows\SysWOW64\rbrzgooznd.exe

    Filesize

    512KB

    MD5

    ac5bb4e84ec418c4b4e10194ebfbc642

    SHA1

    ea1b2dd1999ff98b74e47249888991b7249bf890

    SHA256

    7e2e20817b0ea58e4b5f8a547e7bf63d9e36a9c97f678768b762144b4408dba5

    SHA512

    10a5cafb8fbfee5686955159ecff0f528e1af9063ed62458a447942d3eb3bee9b51da30243f4e975972932f9c5765b441231e3779f37134ea1f8a5a563e3092b

  • memory/1836-78-0x0000000002B00000-0x0000000002B10000-memory.dmp

    Filesize

    64KB

  • memory/2268-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2704-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB