Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 12:26

General

  • Target

    a58726ba1bec2e53069e6c1e269fadd0_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a58726ba1bec2e53069e6c1e269fadd0

  • SHA1

    418525b501aa828a778d6246b5c0e657b32c0835

  • SHA256

    2833bf65b89a5348eeb6e42cc06905485ee17b8bc70f3368adafaf92c5cb1838

  • SHA512

    f9410fde9471e1cc92b84fbdcdfc8800622eb98bdc4c4d6e976ee3c40f7995d7a47b5af798dd7eae19bfa01ac82e939fe3e3900a457d098edf7842fc93fe5de1

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6C:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a58726ba1bec2e53069e6c1e269fadd0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a58726ba1bec2e53069e6c1e269fadd0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\ezqmemtjrv.exe
      ezqmemtjrv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Windows\SysWOW64\euzldlgj.exe
        C:\Windows\system32\euzldlgj.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1032
    • C:\Windows\SysWOW64\zhbsfuczqccmodv.exe
      zhbsfuczqccmodv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4688
    • C:\Windows\SysWOW64\euzldlgj.exe
      euzldlgj.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:400
    • C:\Windows\SysWOW64\hguvizgadlzhb.exe
      hguvizgadlzhb.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1480
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    a1f9934d8e4261d77522ca850ccea573

    SHA1

    5ddd8d746144b86f3f8840b11ba70e16b9d54325

    SHA256

    b385f045c215228c1574c94cbf41b99e457bf121542e387b595c28e8950e6de5

    SHA512

    5a79fa02f79233a4b8a03faaf81c16d20c0c7fc760e27123e56928ed8d78108474da47690e8ae7de13bda35891c5ea42a2670de064da8331e645d4e4f7b7a874

  • C:\Users\Admin\AppData\Local\Temp\TCDB8D8.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    955cfba83c355f3f6ad29e889ef145f4

    SHA1

    e0af6190ffa9db812ff91cd876ebe4e124cd0d7e

    SHA256

    e7c59d033ba6a5ea308e7d7251d7a73b4446637dfe25e212a74b02f0f97879f0

    SHA512

    52e3b919ff075b11fab36855bf9bcb5f3756c4602267ad61c8d46de20c8cf458b54bf638afe1c1b4b7503d6cc18ab32acd200d455144a2bef45fddd4b7d5a5fa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    3de92b4d40f79d8db9807f66d1c2022c

    SHA1

    49c3a697536cbf4bd84c53d031c6ac65edcaa01d

    SHA256

    f06b5c194f7d2881c4ae2118f00351c58f0890bcf22392d95a19ca77b15bc1c6

    SHA512

    65d445c7e47e5c4adfe0bf2b0b9f74110c8a29de1e8e6ecba1af0963ce116f7a89f9257fdc286f21351b7775a0f376741eee6b7cbd6d626b5bad1f3377002cc2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    7b1966fde3ee5aca9aa60fa180c1116d

    SHA1

    bad2f226dc19127661e1e7deed90a3234c9b7c94

    SHA256

    562f94150004d7d6d54167c650214abe85089d65529a1c5eb306cd97e4f7664b

    SHA512

    736f15d79949286439fd5424a425f64ad2844a936ccb032fd44e78778e5e67af6aaa1951ead652ca868db9fee067a981c4b522ed3d12072d6de7bc9414a5a47d

  • C:\Users\Admin\Downloads\CheckpointRevoke.doc.exe

    Filesize

    512KB

    MD5

    840cc020f89e34f8e7fec5859be90fb8

    SHA1

    9128a45459f5afc5d45c86f050e04e633560f0c1

    SHA256

    dff59c19a2257ea012167eed0a567d376b2be423b7c0de4fef1473a67410a6ae

    SHA512

    f5b9064751b96d1e6feca5f73433815feb96404d5b2bd8cd6ebb6773ec90958657708c898c5231d7598eb9d9004f3c46d577688c0263218125dbe4357e44f9a0

  • C:\Windows\SysWOW64\euzldlgj.exe

    Filesize

    512KB

    MD5

    d2de8deafe1e9697238fbf7845cf7689

    SHA1

    351e940c13c7cbf43e83b0a83f79412860e0a129

    SHA256

    55c49bb5c4189a1e23c478db91d79ff7b2191699dc2b00df3dab8c9b3b9156e4

    SHA512

    66cfb8992bb560b22c22b4000cf4757e52882e05ab53c3b612f34cb941a2b99466248bc4dcd820497d98b80aaca7a9a4aef72e411b549ef622a7c3b8b5529f30

  • C:\Windows\SysWOW64\ezqmemtjrv.exe

    Filesize

    512KB

    MD5

    a33772bc94e842da5ab0bfeea2f672bb

    SHA1

    4cda869187ca9405d49295afe2447ab817b1437c

    SHA256

    0f3c81c39694c2252ba1c8aea6afaa9dc37a7bba55742b564be89284f221490b

    SHA512

    9bfe129b1d3bfa542e8170f3029ff269305118f04c8d95f72036dfb04fc086876cdabc402802fd3aaf65417bdce0772cdffad7bc715619ebacebb010ff4a9214

  • C:\Windows\SysWOW64\hguvizgadlzhb.exe

    Filesize

    512KB

    MD5

    ed74be5ab4d099c2c789aeebac4f213e

    SHA1

    c2010b21306088db6328ea3504a7ed6940af60be

    SHA256

    3ad3bcccfcb8c59594f7aa21400e52965deafde27bc00311e8a2c39eb7d20821

    SHA512

    3a94492bf06b5b884a0797928589afa38cb198f97d7cc73eab3d6052d8f6707c0cf42c9911a385f5993ef565decd2b6b95e40d92a56c31d7e21ad2cc67c50651

  • C:\Windows\SysWOW64\zhbsfuczqccmodv.exe

    Filesize

    512KB

    MD5

    0778be5808ef5a2568d8ee78394e67a0

    SHA1

    1e70c5a555f92684790d8cccf29bbc6672a6cab0

    SHA256

    013df8c34638ed21a18199984e98a320d1aab4a162ae215012c3b43ce98280fe

    SHA512

    8468365694fbd0fdc0c471e0c1eecd74e5fdf597acbb1c1491a34bf58afc8e346760b4c03dfbf160b834fd8e68001273edda14d4e94dfb4f21f3ef4191bd06c2

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    59587536534f5312d90715ca8e3f5094

    SHA1

    81d4abdcf37a40087c09cf419e5e02dfa1fd6e49

    SHA256

    889773b0358a9955927a5c282484b49843a96690a35cdbed03672a3c89a0d9df

    SHA512

    e49dcba93da32eb61e504d507e3ddce2ab79ae313f9db11e5b073118b3c3fa50e65036832a0e479bf4891117ad1508441676bd0113efef81432c5b27fba5019e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6f1e9147c2555fc90f914eda56f1e832

    SHA1

    9b98c1e05d9c6a540f35ca735daf4a50167b20f2

    SHA256

    19d2a17370ddce4f473c278009818428ae6622e1a6f210fc5f77d67a57925ced

    SHA512

    53fb8c300d72e677c15d2e09d43b1ab64e650989a08aa7ad8334d50efeb1f01f86c6019fd15d4dc89da8bdce463e772a3cc52a9e6cb3add823b681f07ad62a91

  • memory/1012-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4888-40-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-43-0x00007FFDE6450000-0x00007FFDE6460000-memory.dmp

    Filesize

    64KB

  • memory/4888-37-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-38-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-41-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-39-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-42-0x00007FFDE6450000-0x00007FFDE6460000-memory.dmp

    Filesize

    64KB

  • memory/4888-593-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-594-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-596-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB

  • memory/4888-595-0x00007FFDE8C10000-0x00007FFDE8C20000-memory.dmp

    Filesize

    64KB