Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 23:41

General

  • Target

    a72596aef6eeb01fbc72ebcdd79cdfc0_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a72596aef6eeb01fbc72ebcdd79cdfc0

  • SHA1

    fd24bdd0bd397b966a995c8fa6b04619d102ccce

  • SHA256

    a763f6987b60008555cbec1f0e9221b73a5815a9726dbed36723e82e6462294a

  • SHA512

    ad49bf50331397214a01dbb933b60d3a13d58180a652012b8d29f2d402730a87701f9bfa57e4d9506ab50bd1bbb184e517eeaa4dd4a59f336a36a82384c47ecf

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5H

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a72596aef6eeb01fbc72ebcdd79cdfc0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a72596aef6eeb01fbc72ebcdd79cdfc0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\hkqnlciwca.exe
      hkqnlciwca.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\cbheqaal.exe
        C:\Windows\system32\cbheqaal.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4704
    • C:\Windows\SysWOW64\xeudqnxyauofoku.exe
      xeudqnxyauofoku.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2684
    • C:\Windows\SysWOW64\cbheqaal.exe
      cbheqaal.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2904
    • C:\Windows\SysWOW64\xhjbszcgjxtkv.exe
      xhjbszcgjxtkv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3176
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:740
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3320,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:8
    1⤵
      PID:4560

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Hide Artifacts

    2
    T1564

    Hidden Files and Directories

    2
    T1564.001

    Modify Registry

    6
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    4
    T1012

    System Information Discovery

    5
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe
      Filesize

      512KB

      MD5

      a952d4aa47ee01e8b72e91779ea2ea36

      SHA1

      22d9aa39a807062932b17e3a29d1d980bb22056a

      SHA256

      0178a9e23606f337f47239fb79c0403adedec01788ad574fac15082968c8c4fd

      SHA512

      979d5776e0d319e0995bb67f93e1667e850854e5f07e65c784fa950fc29f4fe66eeef1a48e4ce6b2b22513c96d4ecb240ea68b544bb847e23cbc5ee0d51b6186

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe
      Filesize

      512KB

      MD5

      357671963551c33a946e1a446d4e2ee9

      SHA1

      374469d2fab52e0208249f84ad40cf85b1f7c909

      SHA256

      6004c8e28785711f8a5afbcd8a0895ea56894f753d397ffb89950401bab80b7e

      SHA512

      90389b11cf1d836da3df0e059aa11ffb98c0540f4b0f907dd884fdfbdaed700b33b715af4db39777a8683f051371c369ccdb913fddc21d7c865fac05afbf5396

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
      Filesize

      3KB

      MD5

      bff8a42045b1f378d6067d970885d7c9

      SHA1

      0c908dc9df7e0c4758f048b2e9a156d17c9b72c8

      SHA256

      f4d081464e9957cc78d63935c865f520a6465cb40db133ec87a2fff04dc1df6c

      SHA512

      8b0119e64ec7538b248563755ae3f311796b54e96e4382adfae3146343b9d199d3830af249c25c8cf3b4116cfcab9e4a657e6e902273ac3c700e173568470fd8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
      Filesize

      3KB

      MD5

      96a59ec94231b29b70cd620c235d34ec

      SHA1

      db31f9a6fac767063df13a7c4cf110f75e0783c0

      SHA256

      763ce4503d555ee49850117a125b6c476b0221303e300f9fccbdb4ba404c456e

      SHA512

      c6525657fcae1abd86601b20d2ec3058a814744ad2ede118399443553418344de2d2d41a9911813d11bdf871da7a0eff702a26de1f447a7a6cee3b70e434e8d5

    • C:\Windows\SysWOW64\cbheqaal.exe
      Filesize

      512KB

      MD5

      4264ac3342c032a0334d08a2731dde0a

      SHA1

      a53cf24b3270d69f0994dacdedeb56eebcbc8507

      SHA256

      44ec1bb2bbc4773ef8f4b5455f71fff294dd6d4ee82118b359cb0746a78a61d1

      SHA512

      bbe1ba4e9e096da44a64fac8906533d4a3fafdfb1443e2fd0424deae951e91af90b364da81dc7e9012245f495fa7e5a57c8f4f7170a84f4ca15b6b698bb893ed

    • C:\Windows\SysWOW64\hkqnlciwca.exe
      Filesize

      512KB

      MD5

      d5710929945eaea7c7294f6d6eede9f6

      SHA1

      5818772748f7a5af4fb05f240214265903710707

      SHA256

      c7bc7ac423a8a2e766f92f9aafa574e8ed9a46cd9faee7529a183438e482142a

      SHA512

      84c9f2fbf7054d16ec516bba640fa830d0cda6b35dfb70efe8c062e7af0895316562ab1f4d6350516145ff8d5ef24c0f0b2c6782389cb9d245a26d05261ad694

    • C:\Windows\SysWOW64\xeudqnxyauofoku.exe
      Filesize

      512KB

      MD5

      474d7046d112a99afba99be74f44e2b6

      SHA1

      7c2354d0eb6583d4d7520ffa06faaf07117bb8ac

      SHA256

      485cde23e349517dbaeeb0201f072a212ec7748245da6ea1267b1319963883bf

      SHA512

      b47db250fddddb696865a19f589bbe893a80f546bfa39963f202d5ca045bd9d4f786f98d172febb7aa5975791c5733e65bdcf1e4ccafc25202b8fd08179e1c4f

    • C:\Windows\SysWOW64\xhjbszcgjxtkv.exe
      Filesize

      512KB

      MD5

      4c9b387760f41bd5a0a2e4a67643d63f

      SHA1

      907cefa36c759fddc226d25f6a7281e2c21a317d

      SHA256

      9ca31c8f23c5bcabfc04533b4fee113d667bef3e68cdd2c421ac93be113d6627

      SHA512

      55b64561d923bf5e30b7eba7bd86e9cb0d0658fdd7f1e28bee94046c674381fc509f2ece5b23bb9239624098edc3ea7aed3abcf11b41088f733872544fe14bef

    • C:\Windows\mydoc.rtf
      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Users\Admin\Documents\DisconnectTest.doc.exe
      Filesize

      512KB

      MD5

      d7b4d27b2ba1dc8d6e3e55b15bdd012e

      SHA1

      ac04627ac8981b3df431184c02abe4444148326b

      SHA256

      1f21c603ef156ba4448d1659f6b9090cbecf636d774e5a60e57e8083ba15f910

      SHA512

      f7e834814c09cab3b31812d37c2e35b48c933d209854ad271a6684a54fc9e234515b17f763b7d995d8dd494dcacf8f4b4357b4983812952e47c40df7413f713c

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
      Filesize

      512KB

      MD5

      a67febb0eed0352e511912c6ee3401ee

      SHA1

      2d8e4ba34d3f5ea712b550dcbdbecd95beadaca7

      SHA256

      fd0d8c9541813d19a971ced246984eb9160e40a63eaf1acbebbe4853dfd70a51

      SHA512

      ebd072df75f43ca554064743106e7ab99ed5f454076563a47492722e1559a1b170732a8b9aac6a09ccc46ae077edb53ba9ada0dd1dd5d297fc34d8096a62dd96

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
      Filesize

      512KB

      MD5

      0f8c34487fe78821887e2ca6a3502a1e

      SHA1

      25bcdbf97c5ad6fb6644dd7410cdd0423ffbfe9d

      SHA256

      7648a0c5e4410490bd4c00c425315d666a8f8c3b28fa23646827b254b73912f1

      SHA512

      a7b26bc8c52e2f58a7c4b65980d1cae29d707ab7a820eb63f178adf02050588f5b0fdd78d1a6c7f766854cef3522eb2426e966e76e83bd35a846f5a19d395331

    • memory/740-37-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-40-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-39-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-43-0x00007FF7C2170000-0x00007FF7C2180000-memory.dmp
      Filesize

      64KB

    • memory/740-38-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-42-0x00007FF7C2170000-0x00007FF7C2180000-memory.dmp
      Filesize

      64KB

    • memory/740-41-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-120-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-119-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-121-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/740-122-0x00007FF7C4990000-0x00007FF7C49A0000-memory.dmp
      Filesize

      64KB

    • memory/3056-0-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB