Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 14:53

General

  • Target

    a10ef426cd0e1cb4bb8ce688a0017a25_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a10ef426cd0e1cb4bb8ce688a0017a25

  • SHA1

    11d5aef2860b4f2cfbd13591800b6a1ff90f2ca1

  • SHA256

    ec9e45fbf429dc5c5a12d05f7fba2e9f88031119eb037c66eb6dfa8678abb087

  • SHA512

    4e2f7ad4e9c3416150a2e7741db526db619e65dc2cde75d47c23ca632bdae001945363f048253ab8c006ec93f0977830c2ecd1b89b8a8099448f35943cbae4e2

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj67:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm56

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a10ef426cd0e1cb4bb8ce688a0017a25_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a10ef426cd0e1cb4bb8ce688a0017a25_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\duqwxnnnjt.exe
      duqwxnnnjt.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Windows\SysWOW64\qjddutpp.exe
        C:\Windows\system32\qjddutpp.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1796
    • C:\Windows\SysWOW64\cwprfrqntdochvl.exe
      cwprfrqntdochvl.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3708
    • C:\Windows\SysWOW64\qjddutpp.exe
      qjddutpp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2296
    • C:\Windows\SysWOW64\dbhltsoabqgea.exe
      dbhltsoabqgea.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4548
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    7e0d292f5342e8d4601cbea7b7e56631

    SHA1

    1c0f211bd9323fc693571ea356be192491ae8d12

    SHA256

    85d1b0608f443fe4c9f84731a708fd481ef3eb929215c0276cfb04274d6bb796

    SHA512

    66cce0cf288d1ad47d8b64a8a8548e9e9dfd3ccd06df5c7714b19c6ab50c36fd6a0eb4026928bdc692bab6b0a63fff6bb64369cb4bb09489dea94813a7926a4b

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    a1282df00509ba49a88fe89015f77a36

    SHA1

    9b3fe1126c3b58d883cc160fde55eb75edc496a8

    SHA256

    bd012938377724877f5c0a31b67c2760e46b46ef3f8e319342cc1f26f00f2a49

    SHA512

    fd606e68691598039cf1d73be47988a9383cc4a07a34c0eff2f5742d87ad081214b05972732642bd7e3af4c4c3c9d30d2fb3def7a66a6a63904565779b9bcd31

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    29c06012a024bb04d9da99412a6dec90

    SHA1

    b4bda8f492bed71799b96b43470cb65e724d9f6b

    SHA256

    fc8dc7b910e0f95654329a7cfd24b231b530136b7888b55a12e4a9cfc204f067

    SHA512

    75fab3d4e514be28b392609bca2744702ea4090bf14e96643d8536e22b49dff7c43c4d1bf420499064ac56d67e60a29cfe7de68bb28116af62bb7c7cab1ec88f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4872f655666dca3ce798abafeeb7beb9

    SHA1

    0f8f30a28096ed0878f9d9f3bc735d3c90dbe419

    SHA256

    76f643234e9046fa8d087104111f638570a0132247872d354088d677e939f007

    SHA512

    3630f8e35ea91c103142b2e6ce0477edc1a40452e1fea875cb8d9542ab2268b0bc5d9c4ef6c537d9d611f8c8fd143ce311d718ec44e2e9913b824c6d038b2479

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c3a1f2dabf2b6c6aad005205fa330a72

    SHA1

    45032b346429477898f52473e6c0dc3ea0250a4d

    SHA256

    4eca6e29f34b0f86c055a76da602c6697f595d5a4ad9e64c4977c2f9d701afdc

    SHA512

    eeb108d83f48d24b2ecd51d1cf56c04151ec0abe15d28d8564d87b04c62c82b0934c6161993761d7f31800f60dbf92f72035ceeb92fa028158a15b83d845c14d

  • C:\Users\Admin\Documents\UnpublishPop.doc.exe

    Filesize

    512KB

    MD5

    506481b262681a7f1f650c8093b5e967

    SHA1

    05cbd9cb86f5b68a37d44937d4d37e105d7f4589

    SHA256

    df3addc8b19c1f478b5fd0b142d61733a68e98ee9e86a50bce714fc21757b51c

    SHA512

    b242e00db3a2060b89562fbb75a4c2958bd20b8fa75498478e13fd2014929b33c456da2ca7e7369e3f0b630bd5c0c2c71c549d5ed2e565dc3fee175402509328

  • C:\Windows\SysWOW64\cwprfrqntdochvl.exe

    Filesize

    512KB

    MD5

    018bfff0f2452432829e5cf721277236

    SHA1

    ffc819cf43dd926eab285ac7bfd20a98f7b76545

    SHA256

    f1b224576e077549eeb4c75b72f4e32cbb10c1bda527581d22366f2829764ca9

    SHA512

    61e4b493f62a729f4f0fbfbdce0db7f8dcb3b236b022630d198e14928786756182d353821b0052b501361479b6903b3c17f9b5569f4be317f909c4ca050a3e2f

  • C:\Windows\SysWOW64\dbhltsoabqgea.exe

    Filesize

    512KB

    MD5

    5e0795b837514e610d96558ca7b37d8d

    SHA1

    3c83d7e4c3845274e0dd9a03ebc9e1b0dcaa3483

    SHA256

    c3345893eca701e858dc38a2f68870fcff966e9e4f590c39e8fa2a66a6577666

    SHA512

    9c125f3750264dc26b870bf9210db438ae6d4c291c7e36667aecd33fb4476c95f613de7c6cd59de28759092676a2d6e4929727b7e211e176b0831338e93c6848

  • C:\Windows\SysWOW64\duqwxnnnjt.exe

    Filesize

    512KB

    MD5

    2b16b7aa315de4f721eccb8fba95698e

    SHA1

    fdee15b78545873766a3a54e359345c5d5d6b1a1

    SHA256

    b0a406c3bf74404bc42c68d6fb1b70affb950686caf68a68aae2078587c53232

    SHA512

    c2e3b35f5fbd5082174f68e292f8327c98e3565e0d1bf5fbe8d0dd98eb2eebd3f9cd255e066cea23ce4ea61fbe42f25f5cf2ed370db50e58e1d4ecc481bd1cd9

  • C:\Windows\SysWOW64\qjddutpp.exe

    Filesize

    512KB

    MD5

    6c6442c6740365de6b954439ef37ee71

    SHA1

    47bd3746902f2ff2be0d2d9717b97c19452a7a93

    SHA256

    3fef3261cd8d3289513de6bd159eb47ac9d583c1657a6662ce58cd9e9ceb7d47

    SHA512

    dc334f4639aafccb64ca72a1b3e065676e1a4247202b1715dd1e03421cd4e3a0e3987d314053009b99512f083c4f22ad58087499db2d666fcf7bae3e2319c0c8

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    f7f3785a1965213afaec20cf07e365b2

    SHA1

    421c4cf6eb22612de7d38afebb189d69ce9b9951

    SHA256

    003bc4d7c096028861c807b266d99abcb7951c6a429c9596160b8f09ae019617

    SHA512

    7ade584cbb9c6f65fa81ed9b7c561fb23ab786b1e5a7c7c4adb563e5fda9cb671a94a5bb5691d07f928e6fdfe8ebe00a06567a2276ff41f138f673eec7424d78

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a0469a736b5bdc576ea7c533fd2d7e58

    SHA1

    7bdc23de7e06f89cd10133920285b27c4a3fe3c6

    SHA256

    143763099698d60e97ab5782662662ed6d494494f9606dbf8eb66c03e9800392

    SHA512

    f3237c34653e137540484c8471ffb25e8411e9e4339e0bbd4341e2c1afcd61295437b6faab690061817aba52478d6e060942ac9ca6e61d0ea3fb58602db79d95

  • memory/2980-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4820-41-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-40-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-39-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-38-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-37-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-43-0x00007FFE0C1B0000-0x00007FFE0C1C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-42-0x00007FFE0C1B0000-0x00007FFE0C1C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-116-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-117-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-119-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB

  • memory/4820-118-0x00007FFE0E5B0000-0x00007FFE0E5C0000-memory.dmp

    Filesize

    64KB