Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 19:19

General

  • Target

    8811401f94e7d19dba818431f0ab24bb_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    8811401f94e7d19dba818431f0ab24bb

  • SHA1

    9ed6d413f597c67cfeef8f9ae5b715111311a56e

  • SHA256

    6ecc954899c3cf33481990966c33cbdc0c5e992d81516f2a1874bcd065aa7c82

  • SHA512

    d10c932865d5a8a277f5626ad22da1d8184a9a35507caa6670afb8b0fb0c302d6e16e4d0f92f47920ce1b41e0d2f352ffdeb638dbad41f17f265ff8822048547

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj64:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5b

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8811401f94e7d19dba818431f0ab24bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8811401f94e7d19dba818431f0ab24bb_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Windows\SysWOW64\rfobzyfzpu.exe
      rfobzyfzpu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\SysWOW64\upmpnkou.exe
        C:\Windows\system32\upmpnkou.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5000
    • C:\Windows\SysWOW64\xtqszypjezndgpw.exe
      xtqszypjezndgpw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1704
    • C:\Windows\SysWOW64\upmpnkou.exe
      upmpnkou.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2948
    • C:\Windows\SysWOW64\jngizpmmbszae.exe
      jngizpmmbszae.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1152
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4600

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          9270881899b8f0baa9618f37efcb88a7

          SHA1

          cf2482f2be271a99ab313a866e21d4d78e70337e

          SHA256

          d626cea72d69709bba2a329ed8f20e761290d21a8a2e922d0adc98c31a5f5964

          SHA512

          233f7b66292110c518dfe56aba444fb12fa1b9269125f34c55a7e364854ec89160d278b465aa81c94fc005d86501234e4d4e964d56e2ca922f3eb2edd9297e85

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          08d0134cf1c13845f4d42b902aad7faf

          SHA1

          037f567ed77bc8f14a8f5650383ea8cd7a0f2a04

          SHA256

          8d64d360a713f3a44e28379ed23a309d9aad94a2fbf5798af248d46af872cc94

          SHA512

          6801a8e5461d32608744706f92666a8888d8a17066bc513e16bfdf9ae685b8f7845bd52d0df0ad69b4bab67ac7a0871f696d5e1bab0106b25544d029d581ebe6

        • C:\Users\Admin\AppData\Local\Temp\TCDBD6C.tmp\sist02.xsl

          Filesize

          245KB

          MD5

          f883b260a8d67082ea895c14bf56dd56

          SHA1

          7954565c1f243d46ad3b1e2f1baf3281451fc14b

          SHA256

          ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

          SHA512

          d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          506d7890424e69489a5be1afef5580c5

          SHA1

          cba816211e3120c37d2714d61354265337eae683

          SHA256

          d66db9598aaad84b8312523932d2c802eab42979172e4e1c84262688fed362e1

          SHA512

          68f6ca745d8e50478c4ff4d2072e021187b40e94c3be42f17142f22b79d5150cdd6992cfe12a6119b3ad4ce7d43ea193a303fcffeed35ec7b765bb8f9348515c

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          d4deefe2805e76bdce6c5e3470f8de55

          SHA1

          9fa8b647eea8adefc81431d7de4bf4b1040f0432

          SHA256

          01d83179d527a59dcf45d2c665dbc5b78545eb243a5fa19798bdaf647e2d4115

          SHA512

          981da2534e7d13f93cca23690a7a9c1ea58ff9bda766ba44ae5fc154afb7f86ff486ff222d0f2055ae0a2581636e67acb37e471994c38e874296621f27e43703

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          4bd86eab36495e478ee2e5d9eefd5aca

          SHA1

          d58974ec2df5167dcf932356815bf6cbb7ae9502

          SHA256

          2530adbeb6f7f34eae3ae84466700c62addfc8dd99695260ec8c543d3cde2675

          SHA512

          9c697a5719c4ffe1af6642d25a5e7455fabaa0f62a670de380db45f6930bccc4c7b359f00681ce27cb048e7475db4b36c2eefe9df8e5c29cac0fd36f4f311132

        • C:\Windows\SysWOW64\jngizpmmbszae.exe

          Filesize

          512KB

          MD5

          ecb8de573f632a321995a52539768e83

          SHA1

          4e514ab1d3c4a07a7d4728b5e918b125283c077e

          SHA256

          2ef4abbac54df67644b76fd24cec9a672b13455522ebffd604e8ae23a3c903ab

          SHA512

          549512b9e03567a3830a89a433e78d34e6f2ffb11d96fed105f2c9019aea7ffe7219a47809ea0a1be775247dab0b733f7a7a511e10fa4adaa80a820886f8be5f

        • C:\Windows\SysWOW64\rfobzyfzpu.exe

          Filesize

          512KB

          MD5

          6188357fc51e0d759b3bdbdae2ffd9e3

          SHA1

          07b876cc2822d90d1d58bb5c5b79b946b2d81df6

          SHA256

          770a50dc620ec58da3d6485fbfb03bf67c29150db9cd423f9a9a1f413dac4e63

          SHA512

          181bc60405dfaf633b9ac530d6890b7704085d2eb202a81762598504cef161659695a5370c9e1858d98585e667a8144e51b14993d536b23a6ca62fbd63dbfc4a

        • C:\Windows\SysWOW64\upmpnkou.exe

          Filesize

          512KB

          MD5

          7e0395273a24115140e484aa60a0491d

          SHA1

          f6f21fd0e7d450b5bf88458a84acfe55a10d620d

          SHA256

          f2c17c42f9aa98b8d252f326f8d6950a8752a1f3f5861d4300cca4de5d8f3589

          SHA512

          375de2dc80983b22ef6ef2663ef010eaf062b6019f1eda4ebc1e6bfc8610e5ded70bfd01dea013885f90a7d0da3339a7b4e9d96d9f7e9fdf65ac6a723d229969

        • C:\Windows\SysWOW64\xtqszypjezndgpw.exe

          Filesize

          512KB

          MD5

          9c143947c6ac70d1d10a52cf527e7c55

          SHA1

          e49b761d1b1603c847eb4a22959350166349aa80

          SHA256

          42663313a7aa86a7a4f26f8aacdb75bcb700dde930be86591fae417e4ecf18e1

          SHA512

          873b90b396a952a30fc568bd2cb4b4780706b03e8f77586a5b7a7fcc9b3dae688b77d4c997a95cdca99e8c3dadcdfff2fb4782875a7d65053e1c49302feaef3d

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Users\Admin\Documents\RedoUnprotect.doc.exe

          Filesize

          512KB

          MD5

          a6f3251589e51df2b9585b089b4c1f74

          SHA1

          cfc332daaef4f74d20eeab2870aae2bcf644155e

          SHA256

          09e2b28454989c4140c0a42599ccea684e9eb2f91b95277405619df4534e9acd

          SHA512

          146b6ae6f7438a8eb58b5f172e49a7cb299e4fe99ac65da0e845f955d3633c595ac2187025e042640b8b5d60ab142676d00579d8747eab2d01cb1abdc38013df

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          b57dec37e12a184697ea0f7eba21bca3

          SHA1

          28b6553218c46055e39f24e07ceb71f23d0bf85d

          SHA256

          99d3a001a962301326ec387c8c9ac1b55160c105f08293de091c3a86e3b0a946

          SHA512

          3d4a7003543e22f91b2235604733160d452158e2a83b2256c1d598c622507bb33b6ea4e24bc29a68cd4d8fb83eaa19b5ade6ce8eaa31fbbc8f1e7bec8f19ecdc

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          ded5ba6168593c1991379cc07ff088dc

          SHA1

          cd85b8eb00e0444d87ea139556669a234880e2e5

          SHA256

          9140775bb9bfe5006cc983183840c82c43b33d2c6e61d2c8a67ca18e5dec4945

          SHA512

          3ae7990a4961223d13f96779cbfb14fa3d5cfd9b20464aa38192e43f2d8fdd1c7cf853c91d2e21ba3030817083f07cf1b6e60ea72b1ecf4b35e438efaec40cb6

        • memory/4588-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/4600-39-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-38-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-36-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-37-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-43-0x00007FFA259F0000-0x00007FFA25A00000-memory.dmp

          Filesize

          64KB

        • memory/4600-40-0x00007FFA259F0000-0x00007FFA25A00000-memory.dmp

          Filesize

          64KB

        • memory/4600-35-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-602-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-603-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-601-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB

        • memory/4600-604-0x00007FFA27E70000-0x00007FFA27E80000-memory.dmp

          Filesize

          64KB