Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 12:59

General

  • Target

    86c590399455d5a360adc313da2b593fJaffaCakes118.exe

  • Size

    512KB

  • MD5

    86c590399455d5a360adc313da2b593f

  • SHA1

    e2c1ba7214f1d073537d58b6455ad504afc1fc7e

  • SHA256

    01e0ad82a8682c0d884c54f0660a17ec61c0edc7868446c6fc85239e6f45d3ca

  • SHA512

    a451e7d6c39e976db646699f776bef068bbda3aff66db1ad3587761ec7aca56f29e29ebda8e4e7a7976dd2afa5dc56959410797137785f1551cc19aace97d934

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj60:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86c590399455d5a360adc313da2b593fJaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\86c590399455d5a360adc313da2b593fJaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\pqfewzmiek.exe
      pqfewzmiek.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\SysWOW64\hbpbbwpo.exe
        C:\Windows\system32\hbpbbwpo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3252
    • C:\Windows\SysWOW64\xwjkeipifbwwywa.exe
      xwjkeipifbwwywa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2684
    • C:\Windows\SysWOW64\hbpbbwpo.exe
      hbpbbwpo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3292
    • C:\Windows\SysWOW64\zbdwdxvqcsvmm.exe
      zbdwdxvqcsvmm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4612
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          dbbef0661860cff121dd1cb598704bfd

          SHA1

          be4a9ff29b6a4727bec24408d115f1624fd2fe1b

          SHA256

          48f5cb9a38636bdf532a38fcccacc1d9d87eb0081e72bab82b1e7856068e6d73

          SHA512

          c4a7e98db7ab2b0a55dd59d3f0079e0126c4e9d87bd78609651df394751c0da243df5a2ebf5a5d8b3aba7e6f64500115c27e7e2313027840d604f30861603afb

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          334d45e5c7875da444bd876420985c85

          SHA1

          01aea0b700a1e06d7390a101d63ce33151e12e0b

          SHA256

          d123baa1159dd9c1389eadb703b51be326e2459ceba01a1a554a1e079757e480

          SHA512

          c267b0a8d08459f5e410449819246b7a1beb540db5f65edc0848b35a4c9df548a71f6b329b7e31ab9efa21a818c6822e73c1dc2eeb55546171b7e5c1d19b8b72

        • C:\Users\Admin\AppData\Local\Temp\TCD9A01.tmp\gb.xsl

          Filesize

          262KB

          MD5

          51d32ee5bc7ab811041f799652d26e04

          SHA1

          412193006aa3ef19e0a57e16acf86b830993024a

          SHA256

          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

          SHA512

          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          19bf13e723988b90c8c265a8a491bc73

          SHA1

          d8f41f444dcc4853a05c0fd4fdca77cd63370cd5

          SHA256

          a2056240d3b0c90d7b5440f1a631b6d618332b4441363ac6ac6cb2a61b37596f

          SHA512

          803e998a33372b3ef4450f5014ff0b200fe4d20f871c174c1f5a241e557a1db60947b0dfdf3968fe9f7790148f5426aff841d6fcb676fa48ffb0b45ea3209c49

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          b7a9116ad6b8280f3464a36eca800081

          SHA1

          4fefc2d729a7913b7d07632b1c8d720eb81898a0

          SHA256

          b6ea42ccfcb3bd988cb7f0711dcf3b6f902c8e679b49f1ad8ebd342afac9b4a4

          SHA512

          061194c8bb13e69ade62ae2f53a4060187e19baf60a9d3b19307737dd1ee999189baf3885760700367acbc7e768f9f20fa6ecd7988679543813e559c753ca47e

        • C:\Windows\SysWOW64\hbpbbwpo.exe

          Filesize

          512KB

          MD5

          90df88f591dd4a2fb7f9f7b51bcad7d0

          SHA1

          ec27b7fd3c48fff38daebccae58d23d84b256266

          SHA256

          bbf5539fb43ac23d6349f2ceb4682363b51dbf39a480f99d1f14ee01ec8b0947

          SHA512

          e0df2cff60ea40d728cc1cd921d094b979feec61510f4e09aca0d12e211457ed565d8322d17b86b696b06d57615da8adaa90c29892539373fdf6e180906ea95a

        • C:\Windows\SysWOW64\pqfewzmiek.exe

          Filesize

          512KB

          MD5

          087f143c99e7fddd50f3d34bf5a66e83

          SHA1

          d2436f607f52073aa9785ff91625c3e4851370a9

          SHA256

          d7ef178a020115617190bced0bc9a6c83c17cc067cafb430dc5717af87771b70

          SHA512

          4e57522c779ec4075154b2991e10cc485498feef0c69877026de619ab6190eccedfaf3027d5d9e21891f6490b85b3159b7cd2382844fc1bf84ae16ccf413c2c8

        • C:\Windows\SysWOW64\xwjkeipifbwwywa.exe

          Filesize

          512KB

          MD5

          1f7ef3085c0897b37fb4e28c4dff49cc

          SHA1

          1e85dc318a32e85a0a9fe41746ee7f1d4a9ca63e

          SHA256

          ed093a3f7a5a620a86c47f00ebd5a96e5c68120309459a76844a76bc6166bccf

          SHA512

          c0b8803716280e422c085cfe10dbf002c90a32ca4dd68dbed8c088fdae82b8161834d7635cf790dca288662789b5d426680ee6c5ab57a42c687a71bf7c80f45b

        • C:\Windows\SysWOW64\zbdwdxvqcsvmm.exe

          Filesize

          512KB

          MD5

          b217667d14a6d5d17c764b8073a6a687

          SHA1

          e4123b8ccaf65bfc97e92a51b1cd81c7c13b27a4

          SHA256

          dc6869ba4a2d533d005ce6fe560d0b787c96d0350888dc9bda0c9380221b02eb

          SHA512

          a9f9f75bfebe69aa7772ba1a21947f1eae8cf4f895c266686ce859c630c4c9b7165242988c07da1aa9081b2ac8c9b0f4882801b5ad57759aac060edae2d76bf0

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          6f788ea8f9dad466d9eba72343f90fd2

          SHA1

          bd80e7701954c249aaab0a13c0aaea0a98f53d65

          SHA256

          266bed96865ac415673c9305cd536d13c1277400597034902932bf2584bcca87

          SHA512

          c6b367ec9035e0d288f15bacb0a93fb3ef6616048fa1ff5566bb90b23d407fd14a7ebea455aad32aee72b0b4026a4f502996e09b8233f03c4fbb821bf277c7bc

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          51837bd34ad097b4e538e0894ce17dc4

          SHA1

          6543094bb1aaa6a7097c5ee2d6e008cf9002b145

          SHA256

          8e9cddfe9ffbc504de928631d05cb6bb68d8c3c835d13c00e811a3b6c5a4fdd2

          SHA512

          36af19f42a3373d7e14e49c335274cf8a7999c1c7fa9db1558cce9ef3b4b47705167e0f7e7e41b2d9ab7551dc19e2c8ac8aa0a525a5f6dfcbf1386d055be1a2d

        • memory/1512-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/5004-39-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-48-0x00007FFFBEDC0000-0x00007FFFBEDD0000-memory.dmp

          Filesize

          64KB

        • memory/5004-42-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB

        • memory/5004-43-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-40-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB

        • memory/5004-41-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-36-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB

        • memory/5004-44-0x00007FFFBEDC0000-0x00007FFFBEDD0000-memory.dmp

          Filesize

          64KB

        • memory/5004-47-0x00007FF7C0270000-0x00007FF7C0280000-memory.dmp

          Filesize

          64KB

        • memory/5004-37-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-35-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-613-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB

        • memory/5004-612-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-611-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB

        • memory/5004-610-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-608-0x00007FF7C1730000-0x00007FF7C1740000-memory.dmp

          Filesize

          64KB

        • memory/5004-609-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB

        • memory/5004-607-0x00007FFFBFE10000-0x00007FFFBFE20000-memory.dmp

          Filesize

          64KB