Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe
-
Size
512KB
-
MD5
96e6033ab03cd47e93d0a13c39b47167
-
SHA1
b9378d919e611183d71903621d683f676c203094
-
SHA256
77bb1dd9075470de905be846ce33513152c3fc94506f0e89c9ec3c82cc294bb9
-
SHA512
be5599889bb38bc83a8655f8315f38920e96e49542fc80412ed04361f188f6212fb05304fc02558966030734686c06da1a2efd0c41da23abef5f8e622117ccd1
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6R:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lwukiwanae.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lwukiwanae.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lwukiwanae.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lwukiwanae.exe -
Executes dropped EXE 5 IoCs
pid Process 2548 lwukiwanae.exe 2588 yaxiqepduznrftw.exe 2612 omfgidec.exe 2560 itwdgzdrtewpp.exe 2328 omfgidec.exe -
Loads dropped DLL 5 IoCs
pid Process 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2548 lwukiwanae.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lwukiwanae.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wgsibotp = "lwukiwanae.exe" yaxiqepduznrftw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vlqarapu = "yaxiqepduznrftw.exe" yaxiqepduznrftw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "itwdgzdrtewpp.exe" yaxiqepduznrftw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: omfgidec.exe File opened (read-only) \??\s: omfgidec.exe File opened (read-only) \??\h: lwukiwanae.exe File opened (read-only) \??\p: lwukiwanae.exe File opened (read-only) \??\j: omfgidec.exe File opened (read-only) \??\o: omfgidec.exe File opened (read-only) \??\i: lwukiwanae.exe File opened (read-only) \??\r: omfgidec.exe File opened (read-only) \??\s: omfgidec.exe File opened (read-only) \??\e: omfgidec.exe File opened (read-only) \??\m: omfgidec.exe File opened (read-only) \??\n: lwukiwanae.exe File opened (read-only) \??\t: omfgidec.exe File opened (read-only) \??\j: omfgidec.exe File opened (read-only) \??\w: omfgidec.exe File opened (read-only) \??\w: omfgidec.exe File opened (read-only) \??\m: lwukiwanae.exe File opened (read-only) \??\b: lwukiwanae.exe File opened (read-only) \??\q: lwukiwanae.exe File opened (read-only) \??\l: omfgidec.exe File opened (read-only) \??\x: omfgidec.exe File opened (read-only) \??\h: omfgidec.exe File opened (read-only) \??\x: omfgidec.exe File opened (read-only) \??\y: omfgidec.exe File opened (read-only) \??\z: omfgidec.exe File opened (read-only) \??\p: omfgidec.exe File opened (read-only) \??\g: lwukiwanae.exe File opened (read-only) \??\s: lwukiwanae.exe File opened (read-only) \??\z: lwukiwanae.exe File opened (read-only) \??\l: lwukiwanae.exe File opened (read-only) \??\w: lwukiwanae.exe File opened (read-only) \??\m: omfgidec.exe File opened (read-only) \??\a: omfgidec.exe File opened (read-only) \??\b: omfgidec.exe File opened (read-only) \??\v: omfgidec.exe File opened (read-only) \??\y: omfgidec.exe File opened (read-only) \??\e: lwukiwanae.exe File opened (read-only) \??\g: omfgidec.exe File opened (read-only) \??\u: lwukiwanae.exe File opened (read-only) \??\y: lwukiwanae.exe File opened (read-only) \??\i: omfgidec.exe File opened (read-only) \??\l: omfgidec.exe File opened (read-only) \??\t: omfgidec.exe File opened (read-only) \??\u: omfgidec.exe File opened (read-only) \??\o: lwukiwanae.exe File opened (read-only) \??\h: omfgidec.exe File opened (read-only) \??\k: lwukiwanae.exe File opened (read-only) \??\b: omfgidec.exe File opened (read-only) \??\o: omfgidec.exe File opened (read-only) \??\q: omfgidec.exe File opened (read-only) \??\a: lwukiwanae.exe File opened (read-only) \??\j: lwukiwanae.exe File opened (read-only) \??\v: lwukiwanae.exe File opened (read-only) \??\u: omfgidec.exe File opened (read-only) \??\p: omfgidec.exe File opened (read-only) \??\v: omfgidec.exe File opened (read-only) \??\i: omfgidec.exe File opened (read-only) \??\z: omfgidec.exe File opened (read-only) \??\t: lwukiwanae.exe File opened (read-only) \??\e: omfgidec.exe File opened (read-only) \??\g: omfgidec.exe File opened (read-only) \??\k: omfgidec.exe File opened (read-only) \??\n: omfgidec.exe File opened (read-only) \??\a: omfgidec.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" lwukiwanae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" lwukiwanae.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2664-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0033000000015f6d-7.dat autoit_exe behavioral1/files/0x000c000000015d79-17.dat autoit_exe behavioral1/files/0x000800000001630b-28.dat autoit_exe behavioral1/files/0x0007000000016572-38.dat autoit_exe behavioral1/files/0x000500000001866d-64.dat autoit_exe behavioral1/files/0x0005000000018778-70.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\itwdgzdrtewpp.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lwukiwanae.exe File created C:\Windows\SysWOW64\lwukiwanae.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File created C:\Windows\SysWOW64\yaxiqepduznrftw.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yaxiqepduznrftw.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\omfgidec.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lwukiwanae.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File created C:\Windows\SysWOW64\omfgidec.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\itwdgzdrtewpp.exe 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe omfgidec.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal omfgidec.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal omfgidec.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe omfgidec.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe omfgidec.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe omfgidec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe omfgidec.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe omfgidec.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334F2D7F9D2C83546A3577D770272CA97D8F64DC" 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" lwukiwanae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lwukiwanae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF8FC834F27856E9146D62D7D91BCEFE63659426640623ED6EB" 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F66BB2FF6721D1D272D0A18B7D906A" 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2456 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2612 omfgidec.exe 2612 omfgidec.exe 2612 omfgidec.exe 2612 omfgidec.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2328 omfgidec.exe 2328 omfgidec.exe 2328 omfgidec.exe 2328 omfgidec.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2588 yaxiqepduznrftw.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2612 omfgidec.exe 2612 omfgidec.exe 2612 omfgidec.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2328 omfgidec.exe 2328 omfgidec.exe 2328 omfgidec.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2548 lwukiwanae.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2588 yaxiqepduznrftw.exe 2612 omfgidec.exe 2612 omfgidec.exe 2612 omfgidec.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2560 itwdgzdrtewpp.exe 2328 omfgidec.exe 2328 omfgidec.exe 2328 omfgidec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2456 WINWORD.EXE 2456 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2548 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2548 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2548 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2548 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 28 PID 2664 wrote to memory of 2588 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2588 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2588 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2588 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 29 PID 2664 wrote to memory of 2612 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2612 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2612 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2612 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2560 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2560 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2560 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2560 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2328 2548 lwukiwanae.exe 32 PID 2548 wrote to memory of 2328 2548 lwukiwanae.exe 32 PID 2548 wrote to memory of 2328 2548 lwukiwanae.exe 32 PID 2548 wrote to memory of 2328 2548 lwukiwanae.exe 32 PID 2664 wrote to memory of 2456 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2456 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2456 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 33 PID 2664 wrote to memory of 2456 2664 96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe 33 PID 2456 wrote to memory of 324 2456 WINWORD.EXE 36 PID 2456 wrote to memory of 324 2456 WINWORD.EXE 36 PID 2456 wrote to memory of 324 2456 WINWORD.EXE 36 PID 2456 wrote to memory of 324 2456 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96e6033ab03cd47e93d0a13c39b47167_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\lwukiwanae.exelwukiwanae.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\omfgidec.exeC:\Windows\system32\omfgidec.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2328
-
-
-
C:\Windows\SysWOW64\yaxiqepduznrftw.exeyaxiqepduznrftw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588
-
-
C:\Windows\SysWOW64\omfgidec.exeomfgidec.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2612
-
-
C:\Windows\SysWOW64\itwdgzdrtewpp.exeitwdgzdrtewpp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2560
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:324
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5813f604aeb1d4bf40a74c62db86500d0
SHA120c444b79c68da631220b1905fc3f4725422a111
SHA256a705bbcd5ce84af930df48d63e3174c7cb9317a4a1bacb92eb3ab9f4aaddfd09
SHA51274c45bcb87bbf597d384d7158b45a5ab91034e4e95f887247f3ebcadb08b96b8715ca4ebf0b48e3e05b6e66890fdcf25fb73b1a13dadbd320ce2fead75f5156e
-
Filesize
512KB
MD50ad524459b3d320758d02a30415bbcb8
SHA1c8e15dcef6cf8e261ed76a622b2eb250ad839cf8
SHA2568f4086480750badc8cdee4c3f955563548d070eece25afeaff5bfb18d8fe3699
SHA512804a530a3c2bf94894bc472f799a9543cffaabd25e5a53319afdd573f3d068dc8032f7902c268f31942e3fdf7eacbb19f71ec026dad602f9b50b6cd9f217ccba
-
Filesize
20KB
MD5262a003168cacee15c07a8eb77adf833
SHA1248a833089055a1c3a3b521eb8d563cf38110c67
SHA256063d455e16600f4fd4352b507154747cdc802ef42828395812bcb4bf4e8f678f
SHA5120ab8c90217ecdd0f0e6563fa5f8ff8b80a0f0dae7f3ecda6a4e35c6ff5b194291c5a223d7af7f682e5f15f997d6dde2c607e2df1cb0af32454239381c86c82a6
-
Filesize
512KB
MD530cdf1872740bcfe4e08e5ecbda8eedb
SHA1e58406b618069f65fe52a41b05b8b9525f312d07
SHA2564c488a8f5adcd0edfb3a9418b3a0bb1a4e5128a738e43b90b668f63958caf7ca
SHA512859e67793887bb4b049be88678303c6af2ef6d87972a4f503b86a79fc1b041da1d8f7884308008e13090c99b9bd78191c0a621950ed0020881f6249348d4e11b
-
Filesize
512KB
MD54ca2ac26f844258d2df2aaf53b5c2c96
SHA17226bc2ab423d62b7ab8d0013ed59fbe9b775dd0
SHA2564fc1dabe900e03c0c3a2a3e1cdfe8a03c179994d948bc70f9c9e9111b0dc0bb7
SHA51215d6795998e844d0d14a550d10063f52c4791984cdf79ad8bbd2bd3f27fec400724cfd62291d64f497eb3827f7ffb72b944b02ce8142b6a714719e2d2209fdcd
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5da4b633efe17531da0c97b9dc3f06000
SHA1aef9031b07e407780b37c0c8e6c33706b07ceccd
SHA2565f18dcb1ca28215277f25cfd9bd925c4b1a6209c7e42fa97075371813bbf69cf
SHA51254022df92538ef5a8f44da37ce6922ab024de47088a283202914b3bed869150da9d26bc21299e9f114a9c13654d4f248c6a75f8e31cbbccff7171e6481ec9820
-
Filesize
512KB
MD5d1baaefedd16ec4a6ca6e2e6e46d9602
SHA16e400824ee4df14941d8bcd922dcd5fcaa309568
SHA25681656569725358342ceca9dafea1205b144f463cd0f0610f82fd74c5d4b3996b
SHA512c4782f3693bf01d31d26ab4d11a0405eb4d1a18cd6787d5cb9383a5ed25e66191deb730d3a044b6c8a1711c72a875225f71605591374fbeba382a286116635a5