Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 13:20

General

  • Target

    a5c0af96bf86097e088a09f7fe336495_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a5c0af96bf86097e088a09f7fe336495

  • SHA1

    80c34112b82277d4e691efe9b8adc90377e5ffa2

  • SHA256

    1ddba0cf6c8343a36b45a7c0bd4ac88c82db6ad8dc80f19cf9321f5f4b9fcfe9

  • SHA512

    474589af262fea247570fdb923be7d2c66480cab91f9d6a49c3544b233934392a88a47067cabe103733b7a620921f8ef991639fbdb3c2658cbbd3a3cf49901e5

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5c0af96bf86097e088a09f7fe336495_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5c0af96bf86097e088a09f7fe336495_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\biixoykqit.exe
      biixoykqit.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\lmxtdhic.exe
        C:\Windows\system32\lmxtdhic.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1360
    • C:\Windows\SysWOW64\hhcwzhntzjbuevr.exe
      hhcwzhntzjbuevr.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1052
    • C:\Windows\SysWOW64\lmxtdhic.exe
      lmxtdhic.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3484
    • C:\Windows\SysWOW64\mxjiuraklfoqt.exe
      mxjiuraklfoqt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2392
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    a43512835788b7e79d78a8a1453b4a28

    SHA1

    f28c79112b382d1922be3fe2f585f41e4fb41f29

    SHA256

    d5fb5fe8f0f41a3e960b8f9bb3e48a2dfc5136eba18cb015a8e9cfa13587a50b

    SHA512

    4b1f9588ff6d06eca9abcf5b4b15a7fd9e40caa0a4ba1821a85fff6f996bfe0adfd51d570400efaff07cd17daa0d70231f47e4953b7dd1249e9e88b0af8af75c

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    0532778125d3610b728ea81ddf4ec924

    SHA1

    ec32ef5d83323591361a7174291453fb2274c098

    SHA256

    8fa686d1357c1f8396aa3ff94410dabae921d9b9348bb2c5c2319791a31bae7d

    SHA512

    e1df5ffb5d3c954c4335b825fbd940b41229d376c068a507926c77c563f7d4ab4c0869af093536e33fbd79275cc90f7bc5208d38f08ac5680312a7467231fe74

  • C:\Users\Admin\AppData\Local\Temp\TCD7505.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    f5f219efcf259c0c15a0521bf15fafcf

    SHA1

    68b81f987dbe56b2c44e1c2b8ef4a9c078ea7a5c

    SHA256

    d72d7074d338c425e95ab938b674f45cf7afe1e96a1434d956df4bbd0ecdebf9

    SHA512

    d798ed0683b4bc7b025f5ebe96c8b557948bb7570a3ba7efe4d1844014e4415eead9c06db7454f2f5bc8a83fabea619173cea271cf12945b451c8f357c36ac54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8c91114879ed7c064eb5463a72b61b9f

    SHA1

    1bb0508e5d0477a01117ec7bafc9b0f5348bc796

    SHA256

    75bf673720bbe292bc346266e9c01cfc925cb4816cf11a8e00ff3aa5c826e8d5

    SHA512

    e22c2d4092b8af1405106eb163c4da68f1f585ffeced437b2135cbd34cc24077eabca3f46933ce67a3cc60aa4424d0720403175a80f99b3cdf3b342d14347cbc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    7423848e9a140329e405137207d29274

    SHA1

    3a8c2277901a65fe12723d5de9568cd98664115d

    SHA256

    ccef8e6a7a7eae4d4e5fdd64127feb516b255fe8767617c93ed977ee7963c812

    SHA512

    6efd5775868b3e7bdf5ab88163f82f8d3100a1a81699b0b91faa90697edf6b7134299f8cf838397c125441f86548f5cbffa40824fb88e2a95c91fe8681f8a87f

  • C:\Windows\SysWOW64\biixoykqit.exe

    Filesize

    512KB

    MD5

    d0d4b2971bd2215800a1af23f27a56f1

    SHA1

    66fe2709d97c6a6a382b361b3e10bcc59ada17f1

    SHA256

    45499dec7f2fe012fbc796c0f937ca6851136f91934cc229de92b7531c46af08

    SHA512

    224f9aa89b4ed627b00bf6485e33ab5020e02ab149be4f77bb3707aeeef054cb482ec84f58fd541c2dcf8d2bea2ff261aa5e1ab1072246284dc4871b29cf72ce

  • C:\Windows\SysWOW64\hhcwzhntzjbuevr.exe

    Filesize

    512KB

    MD5

    cd25d69fc9a7ab0427bea9598e412c73

    SHA1

    8a51c528453442fd0e373e0ac71f78bde3f0c629

    SHA256

    34a06ffe2b0653ea07c299cd1966edf777184be8e7a2c8d5ccb43d3b5a558be9

    SHA512

    b931dc96c4a7851fb3823c60e5ea05a5dfd0e1c206e1f93ef6ae9f5fad92f84446d1727373ea65599e34808561229643d25b463c56b732a5b42a6eb4c68bed1e

  • C:\Windows\SysWOW64\lmxtdhic.exe

    Filesize

    512KB

    MD5

    6fa91f624752f9c0f1697de021be80b5

    SHA1

    c6f250cb242d2a18f3c35f089b384ad718a2bac2

    SHA256

    4f4de8aa08f46ee44bfc88cd4cab7abaa899f76b4c6ad4ad6cfa408878ac0287

    SHA512

    dfe8fdce8cfd47b2134efc88aa5d59a79f9572d5c83de32979b760df7237b13f58627c2b5043b2282363c8c97dfba58b5511dca748aea500a6aff1ea1476446d

  • C:\Windows\SysWOW64\mxjiuraklfoqt.exe

    Filesize

    512KB

    MD5

    bf034688b9404cc61474db0b899f6cf9

    SHA1

    98dba7a9e4ecf885aacd30b98c7e8a3d8b71faef

    SHA256

    c54592e2b6a01e0c804f6503d0a14c11e93ba1b6eaf55e06d8634fc7291c2eed

    SHA512

    8fb9aa11acfbd7695ec1e42cdb54af23a20906d799872eaefee9b0e878b4eba3248059ac6613902c7e26997543b8e311349af837350faa69e316a6395aa95793

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    15369e9421cd5dd3307b3f16d4504da7

    SHA1

    f04946cd6b8fae0401a579f8ca4b2e200bc1d091

    SHA256

    33a35dbf20faf92869f28424e90eadb64897f9344267217aaf092f3f7082ae5c

    SHA512

    8244262da348238a0b684cc3c4468662f2c59f6b9d83746a741f297c14bcd2125341d3083e924e1bf8d02d22dd8a5b3ede4639516abb2871169dffb767484de0

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    e10c42435ca2df3c6de4ccc412d72050

    SHA1

    967af76973935bbe86d6fddeb1b6a40726c6c360

    SHA256

    2efed4f19160542d79cf16a8c0a2fabb1920df7412b561bb777be57edc8fff9b

    SHA512

    bcd9b0e062e1e237d5e2a6c24d59bd293e8b671ccf8433db69d8439b47f5f973bd9c59d7aa5144f9c3ddba5ece2a284d3b6d1178611cb7ee782e327269cca29a

  • memory/1472-587-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-39-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-38-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-37-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-36-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-42-0x00007FFE4C3C0000-0x00007FFE4C3D0000-memory.dmp

    Filesize

    64KB

  • memory/1472-35-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-43-0x00007FFE4C3C0000-0x00007FFE4C3D0000-memory.dmp

    Filesize

    64KB

  • memory/1472-588-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-590-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1472-589-0x00007FFE4EAB0000-0x00007FFE4EAC0000-memory.dmp

    Filesize

    64KB

  • memory/1852-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB