Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 21:11

General

  • Target

    8bcc3420bb85080f306b057638f16418_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    8bcc3420bb85080f306b057638f16418

  • SHA1

    38e58f13043b0a1f57e9e1aeaed5cc9c94448cf5

  • SHA256

    d85ed42d81d48d8f2892ff1c172637388f670ebfeabe2c3884563828fa5a6e5d

  • SHA512

    b28107e0cccbafe201ee86368508c5f6dceefb36ddf026a575d62c74d8a02fd9f9034187f3179d9561c9d35c2ec71956acac44f0bba8cc407caefbc54db0f85e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5P

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bcc3420bb85080f306b057638f16418_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bcc3420bb85080f306b057638f16418_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\SysWOW64\omjzdggtbl.exe
      omjzdggtbl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\tzfrnaui.exe
        C:\Windows\system32\tzfrnaui.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2528
    • C:\Windows\SysWOW64\arahlqffjdoztax.exe
      arahlqffjdoztax.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1648
    • C:\Windows\SysWOW64\tzfrnaui.exe
      tzfrnaui.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2772
    • C:\Windows\SysWOW64\fejpqsjozlcby.exe
      fejpqsjozlcby.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2916
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2944
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2488
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1108
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SendNotifyMessage
      PID:2324

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

            Filesize

            512KB

            MD5

            07cdcb7a6db6a26421a5dd7c118e3723

            SHA1

            eab288683360da0da49ffc69d7384c83f0bb0dcd

            SHA256

            a0f90c1d26031a0c9b02b468a380106cf4791f7910a6a6db54e9f623f096e4d7

            SHA512

            02729e761e18f6bc4859e4f4daed5aa1eabfce30df65ce6e0afc10b4dd039d400d5a35a3616318f403b8733d72189e63d09745500a9ce185b9f6c563587d6014

          • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

            Filesize

            512KB

            MD5

            2a837b6764837fb549e0ab4cf63624e7

            SHA1

            bea37b2c3bff0a6cbd84e2ddad9bf0f27611c381

            SHA256

            7c55fd31afdec234da66014dafbb45936df48444625c0fe2ed5b7cad6ef2bc4b

            SHA512

            6c9de8f2bdf73f1c78221ac51d207fe9a37fc23182f846dbf8e25eb99b9616e2991e0f40b7546b0c80bc62e0408f6121584fbf302a3fb8738c2bc14e4d99324a

          • C:\Users\Admin\AppData\Roaming\ResolveUnregister.doc.exe

            Filesize

            512KB

            MD5

            3e7eaf1d5d4eab38fd69b04dc1bea9a8

            SHA1

            5f9e7bbbdc9753c136db84f5979da11278dec6ff

            SHA256

            cf2f2b2d690d053834e6baf0981702b290724e420a248ab423d7f3df351f1539

            SHA512

            8f091c91d0f0cc4feafc12918a17e372cce4f315ba918d55348cd6634acbd1bd8e684f60df9a39c8bd273f1ae1a0dc8053832a3382b06a36e287db1d667bba71

          • C:\Users\Admin\Documents\WriteRegister.doc.exe

            Filesize

            512KB

            MD5

            4984fe7df809b2b55c897800f4f196e8

            SHA1

            a59099eed4a6a8fd4183203e0a144861b0b8cdbd

            SHA256

            e3086e8c895d8f4a0af447657b55c431eee745e6b99d24d387e8037e545518ce

            SHA512

            2c4b1afe0f56b107f8967c4a95bdf977f109ee9c66e2aacc001be57d193695f7173a79b24fb554f0c883b2ae6228781d125cdcdf70733e5e7edd27c9854f8a32

          • C:\Windows\SysWOW64\arahlqffjdoztax.exe

            Filesize

            512KB

            MD5

            3d87fa85faada215dda131afa392dabb

            SHA1

            6fc3baa43cc17e34dab4602d2b34f2260e791aec

            SHA256

            aef0f7699a2076aca3f3065746036bb44e2a98baa4304f4054f27a8cd748572d

            SHA512

            d561f5382e575b7bcefc0caf49395140c186c46992a5907ce80cfa7a123b94e87ca28d80817a187e9e7d55d0a40304b44dceba1b0e8a257045b3e45dced0afa5

          • C:\Windows\mydoc.rtf

            Filesize

            223B

            MD5

            06604e5941c126e2e7be02c5cd9f62ec

            SHA1

            4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

            SHA256

            85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

            SHA512

            803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

          • \Windows\SysWOW64\fejpqsjozlcby.exe

            Filesize

            512KB

            MD5

            8c69335bcd91a0bb62a50053558b6e29

            SHA1

            099ae4421436d67ffb747952c162b9e20ed4fa1d

            SHA256

            cb002f538ca9770a53a5e20e01fbdb5f5feedc5bd965068a9084f59dce634fb5

            SHA512

            c584cc9861b56cb78ac7ae36ab3d2bcd8a7bc9b0f35f16c790680d396ac98ae0ef7550fe00ed63b4f0fe0e492c8c4425177b967596f295882e708c3abbcd5186

          • \Windows\SysWOW64\omjzdggtbl.exe

            Filesize

            512KB

            MD5

            7abb32705ac3e7b9c1993ac7dc2595b6

            SHA1

            c95b78541fdeac5c514f482037678033a0232b19

            SHA256

            e86baf5ef515048f8d2197704b31f7cec2fcb87596c75fbe28eae8e38ad2e770

            SHA512

            7ad4cb99051e45c7c44124dd8515fb83c30e3194b4c1aa05245be5e0bc469271d3417df5e737668b1d9f816328ce770ad47e477ea2625d06fd567dd02820867b

          • \Windows\SysWOW64\tzfrnaui.exe

            Filesize

            512KB

            MD5

            93182677735cc9209e0437562ef9824e

            SHA1

            017927127cdbcdcfcb0797c1b991ab7fb9bce9ac

            SHA256

            61ce4a20e32e7316c4bebb29d2d22333c956b6a159b032231ea11bd40aa7259f

            SHA512

            ad63a8421913ebf2f28431b0a7d045444cafbfd20989ae0d252c21ea9ed77cd7f018d1d2df66034d656a973374d1b85fb3c6263619a4baef6318cda491c8dc2c

          • memory/2136-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/2324-89-0x0000000002A70000-0x0000000002A80000-memory.dmp

            Filesize

            64KB

          • memory/2640-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB