Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 05:57

General

  • Target

    a418451e9a22dd1421f511b39a92cba3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a418451e9a22dd1421f511b39a92cba3

  • SHA1

    f452a3562ce7623521da143ffa1e82791ba49b4c

  • SHA256

    774aec47c8a9c924538b9a267a995a64ebc8ecf4ee3edc33d537bfa0b2f3e686

  • SHA512

    8147adc7a0868e821ac914207c5d6330badf7cd0340c040c4a8ae6cb2f2b24da3fb9d835bc4cc00c9725287d05cfa0906ac7769bd01be2d4889cb7c43693275c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6n:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Q

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a418451e9a22dd1421f511b39a92cba3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a418451e9a22dd1421f511b39a92cba3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\skdcwthkmg.exe
      skdcwthkmg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:504
      • C:\Windows\SysWOW64\bmrlcamo.exe
        C:\Windows\system32\bmrlcamo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2172
    • C:\Windows\SysWOW64\exvpewpwyiuwixo.exe
      exvpewpwyiuwixo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5580
    • C:\Windows\SysWOW64\bmrlcamo.exe
      bmrlcamo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:536
    • C:\Windows\SysWOW64\zdpfpauowxenq.exe
      zdpfpauowxenq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5292
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    1533793e6f24803dfae49c0b3c823a30

    SHA1

    abbd75157f8c8613b06c07d0643b36fcaf7199bb

    SHA256

    11ef922d4b496b981960107664e9ea4faf9ad8435e4e84c0a8b57afa766dac06

    SHA512

    ad33854b034dc58bb56d3b014b751e0e0d9197bd09e94fb8bba0d230eb56d80144c6576e7e1f82f00f5f2e6ef7d5b5426480e0b2073da72f913de8ef7b6b1a2f

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    bd30dada7495ba29303310d6e093eaec

    SHA1

    062b0761541b5b21588dcdf192ddcffd0ed8f75c

    SHA256

    27cad25ce1ef2b1607d3b3335f113f10f2eea315b9ee2b8a6c7b1c344d726fa4

    SHA512

    1689962d4c4a21f5dffe62edc2a31a3fe0ade7f4cf50fd1f6b5e8c2622ac94e77a74c034a950b6a1a012c264a1ff125381bb717267ddc4697d255f75ee95dbf9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c65f4a30df4cbde1a833d86cf32da86d

    SHA1

    1041df6987b2121a1422f93bf66b164c381bc0d8

    SHA256

    8b5963328648f1baf00fb394277e894b29c98dae013df2f1282d6d207d5ebceb

    SHA512

    f2e43455992187a22ba411958cd42fe7b98adf3f80b1a365a3b6fd61461b01b8fb672695d4365969a62a2c519e95e8c90919f60bf3d3f7b5e880d30938d096aa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a6c30875421f51b6d695aabb7f464342

    SHA1

    80e01f3459cf44aebb7971eabf68af53e1810caf

    SHA256

    3e2477c594bf915951225ad92f97881265670c53b10be47e346cfa36057f0784

    SHA512

    b85b75bf7d8888f73fb69145e8f10d60d50d6c28227659361486ac3ad997323fa1633cab90f5f4bfc8cf4a94dc3e6cb9614385d002d8305e65ba8f4a2da1e862

  • C:\Windows\SysWOW64\bmrlcamo.exe

    Filesize

    512KB

    MD5

    2289fda84a61b1764e57fbe60dba1a35

    SHA1

    b52691cd19841fd1f33f3b8e13e766b9635fc5ab

    SHA256

    8f2205c80f0614fb241b6021a0002115a612cb7a07f80ad2e85ad2ed6db800c2

    SHA512

    3af9eb8b5d707e08e0be21c794b02c00a7193f1d509c0662fd85bc82f27f28c06ad1f99dff9492e9f0549d80b4838a92af72e9baf23ed2dcde89e25a8439a94d

  • C:\Windows\SysWOW64\exvpewpwyiuwixo.exe

    Filesize

    512KB

    MD5

    9ae62fef6c770fecee0c7d5d06d75ec0

    SHA1

    c930baf1fa3f64654dc727dfc2cf61862f08def8

    SHA256

    cdca2490fa8cea008d76e6da1c42d7b37d55ea73c20513156cc5c10d73011e3e

    SHA512

    af040ce3a2eeb7a37d6ecfe259888fe3afe457ffd675b0720ff24546ef3531f57757c57782cbb851f2bc84c767a314075051abcd2fd8879f1e97a2d7c012d760

  • C:\Windows\SysWOW64\skdcwthkmg.exe

    Filesize

    512KB

    MD5

    42e33a87246f1063ce8a9e6718176365

    SHA1

    b93f6e9b9e1681df1462c3e69773dc6af9a631c2

    SHA256

    a9c2bfd90b3e41612cbd4d197319de2357c100667870838960901980340c332d

    SHA512

    44ae6938f43ad3fd3c82900c82e700c8b84fa127bd602307e07fb8e8d1ebc07a1d1e6cd071458fa11feabc74f842ea7012fc307778b2a94b5ad7f0c362aaf428

  • C:\Windows\SysWOW64\zdpfpauowxenq.exe

    Filesize

    512KB

    MD5

    f2d9db9e36a8f79db14c2606c491adaa

    SHA1

    97e7f556ee6ec2656d108369b1a5561177e824c8

    SHA256

    c6ad5e0b0d9f82ad3f92f9594b4c1faec3465de808dfbc8035c8c3eb3bf19c7f

    SHA512

    3526c32e2e3bb75ffcbb3668a260f1b397da42c5a9c156cae0317676a3df460a4360d8a8c2fa0e97f90eec1ffdce8da0a2b32be0ceb41159c0161590f92fdb88

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    e54eadabedb227397399604b07e18aa3

    SHA1

    b9198be7e9c448877f2366c77d294506bdddf07e

    SHA256

    c5836565a033e5cd28b16c376e1feab20eeeac4727ccb1fcc2c8488bb6d72195

    SHA512

    df39d180d56e2ec8ba8da81c0fc8a6df80bdb598e60c0b96b48c767b0f0b86cdcc5883c7f52b4446c00090551fd4839d622e60c9b25f767078dd6f73004bc4bd

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    05aaa217959727bc35eee51ba32cf8f6

    SHA1

    001ac93f8d99a86ea9d0be6cde167d79dce9ea85

    SHA256

    6c2710047a82020e9dac627d62c7b8ddb2291a70a3375637e83636a899c55b8d

    SHA512

    8bd39dee800f95c5e89668adf7bdae1df3e329d00ccfd3cc200c59cd83b957e1b2bb1c26c97c2098746c288fa8c7ad5d40fe4d4dc1fa2114a17e5e0a75c82e20

  • memory/1620-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2324-35-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-38-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-37-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-36-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-41-0x00007FFA4D910000-0x00007FFA4D920000-memory.dmp

    Filesize

    64KB

  • memory/2324-39-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-40-0x00007FFA4D910000-0x00007FFA4D920000-memory.dmp

    Filesize

    64KB

  • memory/2324-118-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-119-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-120-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB

  • memory/2324-121-0x00007FFA4FF10000-0x00007FFA4FF20000-memory.dmp

    Filesize

    64KB