Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 12:33

General

  • Target

    982c48d4a50eaaf6cb55bf728506faa7_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    982c48d4a50eaaf6cb55bf728506faa7

  • SHA1

    09e7f85a315af290b6e986798c90aa3946919578

  • SHA256

    e05e7fb608df5b9c6c43ddbee6dd4a62fa312538f359d174c0d8e760098c4f3d

  • SHA512

    955ee7d088ee7107062335945c95fb03f9e5be141fb6284673f6f9bc5c6c151999409dae995f5cea338762f88dd94005a54e026ca9b8d5cefe2fd0704969044d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6b:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\982c48d4a50eaaf6cb55bf728506faa7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\982c48d4a50eaaf6cb55bf728506faa7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\gkxtmqorbx.exe
      gkxtmqorbx.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\SysWOW64\qbxzevgo.exe
        C:\Windows\system32\qbxzevgo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:524
    • C:\Windows\SysWOW64\llgwabmvpekdrqe.exe
      llgwabmvpekdrqe.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1116
    • C:\Windows\SysWOW64\qbxzevgo.exe
      qbxzevgo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1608
    • C:\Windows\SysWOW64\wychvgtniorns.exe
      wychvgtniorns.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1276
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:784
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2552

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          4fe92be4f4fbbfecb6576f15da74b1bd

          SHA1

          9b4804ee2f291971d954c66f5bb76a8dbbb69161

          SHA256

          d0bde2ada52e6b22c68236ff77c493ab53375246e656ce97ded6f63ddb961039

          SHA512

          144771951334e1470e2b43f1ab739e4d633fe4dfc29d9813e739233a780e318a6f708b093ac4e9a6290d0acd82ecacede1f7d62a7e9759d8ad5f130483b0d59d

        • C:\Program Files\ExitSync.doc.exe

          Filesize

          512KB

          MD5

          bb28d676805b2386df2f8cd92a32825d

          SHA1

          e4b9f7263fe1de90a6fbc4256f646427a3171dbb

          SHA256

          50349175b7c17ac7ff2c6b5e9cd9161251af8be4ba10cf8f1ec02116bfe717aa

          SHA512

          3dc8cd57ad4f62d2026a5cc92a0c05385e2bfd7770cdb72fea87cc8270905986a8ed57f0c9df7a9db0e8db68f2a9935a546867e8c0e3968b0dceccd5fa7085e5

        • C:\Users\Admin\Downloads\SelectSkip.doc.exe

          Filesize

          512KB

          MD5

          511469f5a08191edde43df2c9e08a020

          SHA1

          e48737c988c5b92b4be2b5b2b240fed9fec9ee3c

          SHA256

          51f0b14cc36cf57dbc932fcd23e6f2b0f583d492afec52dbd4665070a00c68e9

          SHA512

          2c2f49627323865b44a48c84ec8db3e825684167d9f04ca15e672bc3eb332622f1991c1eeafb6b0daf24f0f4e05b4300c54a22e13b719c9979d3541700db6d85

        • C:\Windows\SysWOW64\llgwabmvpekdrqe.exe

          Filesize

          512KB

          MD5

          223820cffb396e9f06d4c5e77bd07c8f

          SHA1

          9ac6e63d435716c8afaa56fc662f0561708b1c4f

          SHA256

          69da4cc265f9179fd1723b74badb2d29fe39b9a324282b0b9e0c89daf05cee60

          SHA512

          1fb255adb71732ff1804bcab31024e3ff929ac51e9ef224c2491c16b170821ede02f8ffe84727578b8b5e22173523f0630764d1e45227e767e1d9d410598fa7c

        • C:\Windows\SysWOW64\wychvgtniorns.exe

          Filesize

          512KB

          MD5

          15b8d951994068efe91697ad53359835

          SHA1

          494b17935796fe5460b461228c73e088db7b3c38

          SHA256

          b31069b568372ff6ac3cf73912898388f08511c5c3327ecb9af57c8051e78720

          SHA512

          ef1fcc7f1b3c5e2ad430185e6418c230ca32befeafb4b97fcb084a4b4433290e6782d95108bd86c9737f2099ca54a0cd7e60f7923d327e47bbadaf13725d433f

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \Windows\SysWOW64\gkxtmqorbx.exe

          Filesize

          512KB

          MD5

          7564799dba204e8c7f3661a753348eb2

          SHA1

          0a71017a1e10bbb936e80377b9915e2e13e73c33

          SHA256

          0a5ea69d816744de8a5ee15919d0f294432ee83349409dfc692a4e7984ebaba6

          SHA512

          d4b73dc4d844d623f2e7b5963aec09e7c45b3277c6594b944decdb7227729f71ff8e2c4ebfa17d067a75fa9df9a8075c9c60ed6a1a621d940c0e8ef58a868d7c

        • \Windows\SysWOW64\qbxzevgo.exe

          Filesize

          512KB

          MD5

          076efed4b33182979ab2d8955bd9fb96

          SHA1

          f1f6c4e2c40da7eb28404c2b33758be6f6f4fcd2

          SHA256

          11f024901f6b0df3ac7350e420f4d38624b14f7c211b71a43878cf874b1b6eb3

          SHA512

          3237fbf3307c0236439a565308f2cdb71ae1c38e794b89e3fe8163548956e4888bb18b7eb7680dcdef46999a6e464d36122b021268d8d08d00f8276960aa2b4b

        • memory/784-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2224-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2552-89-0x0000000002650000-0x0000000002660000-memory.dmp

          Filesize

          64KB