Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 01:02

General

  • Target

    88ecfae8c38444a02f18843dda44b79f_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    88ecfae8c38444a02f18843dda44b79f

  • SHA1

    ef52b97c1fae4b039f85a909121be3657abc0766

  • SHA256

    9738ac56d8a00bd4f7a87140d846e3750f239b52c64f3149c654b0a022d83691

  • SHA512

    cfadaf7a2f26ea3154cb15614f52a205f926642bd8ba7bbf5ba9b9324b386bb09034baa197cc9a38d0db1bcbd3e6d8bac3901746c9e1308f16d26c336b4e55c0

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6l:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5G

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88ecfae8c38444a02f18843dda44b79f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\88ecfae8c38444a02f18843dda44b79f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Windows\SysWOW64\ulmahbkptu.exe
      ulmahbkptu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\arssqxga.exe
        C:\Windows\system32\arssqxga.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2096
    • C:\Windows\SysWOW64\vsqqfdvlwunxwmo.exe
      vsqqfdvlwunxwmo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3656
    • C:\Windows\SysWOW64\arssqxga.exe
      arssqxga.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1964
    • C:\Windows\SysWOW64\vyyixnjpdslfh.exe
      vyyixnjpdslfh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3812
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3964
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5084 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      e31f0b2cb0c20a22d4c1da7d32a81780

      SHA1

      17a6def49a2af89bd425da4c3b0b0d9f58f2018d

      SHA256

      bcf3f0fcd993dedef0af5991a5657e4b6dbe284ae9f4b500dcae55175704b4bf

      SHA512

      bffb6d4777bda84fc7463310e58aa59803fd333f8095753560ea896f33570d30b7b07e108b8a9fdf021bfb3f47b83c334d9b8fc36526fabf2c0c883555db5e90

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      1e7047a5f66b044376a3540c10447368

      SHA1

      ba325ebe92c7bbb10e32318fd56e4b47506294ed

      SHA256

      d8319309d162f6dc867987b1ba9694fc50d2c7a8791d23e22fdf3e1b8b940b7a

      SHA512

      b1e01d8fd87a1cebc227687dbc2083a6249e164addc5391187ab0786bd19cb5aca2d95520f3471a34bc7c12f76a502a2fedbd38cf34cc4698242047b7c188d3a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      05dc19dbab397a6a3f8934d0048ea3f2

      SHA1

      53865171fdc8afba28c5030e2a60aa51cd57b7bc

      SHA256

      2a7e470d227acc34d4d2aa76d910d28d35738dd97730cc2c4e97b5c0c4589262

      SHA512

      fce06d434f56838e63e63fb107dc60b686b573e750b64b9d9d4d24254db0cea0a252d9a97681a43c4cdca6f0db56addbb946d283697ea654814a4dcfd1c35046

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      8364430eb125a4aed429900048ac0973

      SHA1

      9e986399df7eec1fdb912fb2cbe0352c7d98dcf6

      SHA256

      e0619534ee4e4af0c20731700d0260db5ec1cd3e1a8382e946c145324693564a

      SHA512

      de602378a75679e2b765e1615bb848a51217e6d6a38ec622498edaa7aa7837a37c17528b381e3f5cecfbc31625cfb29c62f46a5f75888930e380be4d9dd6c1a0

    • C:\Users\Admin\Documents\ConfirmAssert.doc.exe

      Filesize

      512KB

      MD5

      f58d4ba3d4a66acf64ff39d3173c10f4

      SHA1

      2268219342a51f30bd993432f0d4ba0b678f349b

      SHA256

      bfc64a6f2afe4bf6f0b176d487b032fc61ee1741bf7558e44df6f9751e2e0792

      SHA512

      185a2f978ec121218de5481a5e25417531b7e4a8fe3898c0772fff42d23be4ef707aa152b308d6c899fb9f546809787951bf240010d3d5a8d6a356d1e863e1cd

    • C:\Users\Admin\Documents\UnblockReceive.doc.exe

      Filesize

      512KB

      MD5

      6b13c46539b4c68273635d9375784754

      SHA1

      211ab1406c7c0370946e6dfc2a63d1e3ab2cde8b

      SHA256

      adeb6d4ead7204dff6306fa4ca3a611e6bfdfc0b7499464b0b91c22605c5e30c

      SHA512

      3261223c1a43e07144992452796239ec5fd30e5ac7df76f23d61959723ffc0fda829a7d70bdd7ca24e10c789758d1609d8c8460b7c1ec8e552f1178970e15b0d

    • C:\Windows\SysWOW64\arssqxga.exe

      Filesize

      512KB

      MD5

      ac0834baea9ae0a4dfb22baa72e51402

      SHA1

      5f547430b8f087d019eb1a08cc843077ebb25b46

      SHA256

      82da7ea35ab6d512ce4598aae80f1b573a94526c3acba8843c024196622dde87

      SHA512

      300052f9c1d951dd6f86f22cd613e16ebe1eca5dd3da9b63b458c00dbb7246960470f2688c54e5ef78ed56d113e9b64288189ceaa8de729a41b493ed0b79d3d8

    • C:\Windows\SysWOW64\ulmahbkptu.exe

      Filesize

      512KB

      MD5

      0651bd8f9ea34a32bd308157dda423df

      SHA1

      359423e438cbc288aaf793f010248961f127097e

      SHA256

      89c2a09d2939f4a1b87a584ef2aa9e20f14abdab21a9ad06854f9ef1704483ed

      SHA512

      8f3370cda1d3450fc04c879b3a49b29beddce938607ad84ab6e61222009246574e5e637cdb6b4dec2d3be8cbe628393d9ae56145a85b00c673c02a92b37d6de4

    • C:\Windows\SysWOW64\vsqqfdvlwunxwmo.exe

      Filesize

      512KB

      MD5

      cf25450e4ff9b51131ae3afabf30cb14

      SHA1

      74741ecba2aa2df5f716195fbae70056a41e5813

      SHA256

      313e238125a196d07648dc7a20daad36dc4695bd7bf5f0516071fa9182e31860

      SHA512

      43cbfd816acb4c8be7ad3163e810d92df9b8c27dd89b9fc9f63750dfbfe9290f80c55f64d79941d8d22be1e6e29248d2821895372cd5d2e6fbb224b3c95be59f

    • C:\Windows\SysWOW64\vyyixnjpdslfh.exe

      Filesize

      512KB

      MD5

      28c1ffa898b78e81178da28a9078c6ae

      SHA1

      fcdb2ec4bc4b77f03d5a6c629bff519c1d8e5572

      SHA256

      3a7141f271980160e7042df98bfe4954c30778fec12f39aa09186c52d923fbf6

      SHA512

      bcd75955ada05e5f27561828cd5483ca61bcf9b25de4b37ce60afc57fff313cd82f7b542008c879d2d2ff600bd64124d874ca0d9b2a26f61ad59eb1f459ba668

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      38a5b05e272a21e8acbd420cbd9395d7

      SHA1

      407fc212151ddef351061eb5de04477ed2e5d484

      SHA256

      f2632af80391d82ea09a9f593fca801efe8cc6deacf3605de0f681e1d2bed910

      SHA512

      eb0d66e24c26af58081d39a932549b6cf2b97d741238b653d6aecadff8d90cd0288b8c3f5d76cbc7931b700bddfbbf655a5bd445b7fbdc640b662c9863585afc

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      dc7a32f3f02339b14d8909f649541a42

      SHA1

      6556b18acba7737f4ea72c17ca1f984ae494d989

      SHA256

      4c9676566552a34f3ea94490f63cc6fa4a0b27700ac6c83aa025ad00e39a1a9e

      SHA512

      03cb335830b4636a236a5e701f2de8a8031681ea007e9975154abd1ac392c22d0f84e1ed26777b52e2f53b3137a0c6d8b1768af85aaa155811a1c62828f2c6f1

    • memory/3152-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/3964-41-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-37-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-39-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-40-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-38-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-42-0x00007FF9E3B10000-0x00007FF9E3B20000-memory.dmp

      Filesize

      64KB

    • memory/3964-43-0x00007FF9E3B10000-0x00007FF9E3B20000-memory.dmp

      Filesize

      64KB

    • memory/3964-127-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-126-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-125-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/3964-124-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB