Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 06:13

General

  • Target

    a8477d3ca529aea43cd06a3e9e70360f_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    a8477d3ca529aea43cd06a3e9e70360f

  • SHA1

    1785efcb6447185043b5c0501b232f2229df9d4a

  • SHA256

    88c224d410f03525341083253ab2a38f460f613cbeff633aee88c7af00e7e7ee

  • SHA512

    2b630a32f5c1a972dc356f6b7b249c131fd240d8ba416cf6b1e2264548de897482b4dcc4f36021b668d0d3443ef4d6d6815c43d95fcac13ad72ac276a2f18e78

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6t:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5G

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8477d3ca529aea43cd06a3e9e70360f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8477d3ca529aea43cd06a3e9e70360f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\drqhikzqub.exe
      drqhikzqub.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Windows\SysWOW64\chsolqgd.exe
        C:\Windows\system32\chsolqgd.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:332
    • C:\Windows\SysWOW64\buzkibstegxxtix.exe
      buzkibstegxxtix.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3316
    • C:\Windows\SysWOW64\chsolqgd.exe
      chsolqgd.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4892
    • C:\Windows\SysWOW64\bzsfnrzoodzet.exe
      bzsfnrzoodzet.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:116
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1112
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2428

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

            Filesize

            512KB

            MD5

            3b4bd301a971e1f05b681f8e7146163b

            SHA1

            e2f39242c838329c0cb9d667aa1afabf444c80ed

            SHA256

            bf07804d5199dd087a971ae5d85c0eb1fbbe163674607df08aa9a418db95955f

            SHA512

            7e55186796b98f85835534e45ca23eec4b71dfb7bbca1e25347c9fc36f46e1b43cefe0da678abf24665806be103cfe2263058b62611f058420e8b0a6a6b8c63c

          • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

            Filesize

            512KB

            MD5

            bc2d262188f2e458c2a42c54c3aa14bc

            SHA1

            661fa932586148b42d3713789500982345c186e3

            SHA256

            0fda2812491b498cc47c438fb1c4ebbd3498135137be9654cbb9c64d74206d19

            SHA512

            51569c02f5d7b256d26e0c7bd2ebe1fc2337b98a99f3ec7efc6e582f2e6092cbc20037d6fecb5fd46560da36be2614292c159cff510731b798065d8ded33b683

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

            Filesize

            239B

            MD5

            12b138a5a40ffb88d1850866bf2959cd

            SHA1

            57001ba2de61329118440de3e9f8a81074cb28a2

            SHA256

            9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

            SHA512

            9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            dc1cfac16361b80f97ee0ab5c91f03d9

            SHA1

            7a2801177f93e72e04a94dccb8f45f004a3cb072

            SHA256

            51217337de93fb69e11df24da841f135dcaecb0eba1289a870c1a67f5816ebc8

            SHA512

            a854a9e9bc595128b9b7fafe9086ae159caf58b471e543ebb26a302107bbcc701b8e3b4665268a5b9599317520717cf4cea8f8d70a56f7413cfc26f8c0f3e132

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            720b07a0467fc72a940ae0aee77749be

            SHA1

            795726922f5a12ad19bee1d7c8ed0e088b03eb65

            SHA256

            ebe36bcb704db0adc895ce55df1150b9facfe9581b7df165b845c64c6099708a

            SHA512

            ba395692661d023f74b9e6063f2b4ccf47309eddd36b357f5f6e490fa3179a12efdd91f9285d282f19bde8117b2527a1295a8478c243a2cb67ca414381cefc33

          • C:\Users\Admin\AppData\Roaming\OptimizeSend.doc.exe

            Filesize

            512KB

            MD5

            d84877c968362205d9eb56798b87d48c

            SHA1

            a9d2b84e6dd14d9aeb0b65a1b01dcb0b2833c27f

            SHA256

            947b13574c6cefb0430364dbddfba56ab5c5a32e1fb906b710f62f3e1b6e7528

            SHA512

            c8c26ffd6b7edec1269446d6a216cd3a9b70ee1992167f5f8e3498b1170db86a4918c1cf4c5da566f8b748f5dbb9fa13dfd0ba4cec1b752041da0ec8925e5789

          • C:\Users\Admin\Downloads\StartBackup.doc.exe

            Filesize

            512KB

            MD5

            309d7d4a54e9ce5165246e8ac6246837

            SHA1

            64f69d943fb051f78aebd7d7d891714a586202e9

            SHA256

            6200ad575c19d6e5d85df73fbb158f532ff7fce9003df2c23fcc3f95dd54f90a

            SHA512

            8c7073ee8a5751840c8868b2c6ef92c93c15cb0f01a96ae1bed62a844f4165c1e0bef221b68f1c1dd428a7249e0551453c4c873a916899bd8900c7f14f3be647

          • C:\Windows\SysWOW64\buzkibstegxxtix.exe

            Filesize

            512KB

            MD5

            c9163de88f10b0e290b441d078975bf5

            SHA1

            d3a010a6399b7c7fb07f0ee455c40017b723927b

            SHA256

            6705b3fedb6db49c5277c2598087dcb390f91a7beec1fa71f51409ba1e030c79

            SHA512

            903010df449e73d4257745e9af30c95ce3517fd04c8b01dd8059829399546d08bafb2c9f698a477e75fa01fb49ec09803878aaecddff930161fd56bb0872144e

          • C:\Windows\SysWOW64\bzsfnrzoodzet.exe

            Filesize

            512KB

            MD5

            70908c5cd61803d6c37474bf92ce11d5

            SHA1

            9e51b04d70f186def5068b761a6c5ba5082d8e4a

            SHA256

            f4d0a74be2c60820f716d5523066db49f8a3856a13048ec30f8d00c4700c55b5

            SHA512

            d731dcacc4b3729dc46527b1ed1c2869fde2af7529597b4db0aa3aed9b2a3523045b59bb85abf067f58219ee5414305e5fc0ea7ed67f11f4bd42d122ec9a9085

          • C:\Windows\SysWOW64\chsolqgd.exe

            Filesize

            512KB

            MD5

            8fb3451bf2090444b97fa506e1177e26

            SHA1

            172466a3daa63554d0c4e56801720cdbac8789bc

            SHA256

            b3159dbd0149cf399b7e5f3fd26ca58ae747bc6e16731f24e7d0e1b33447f22a

            SHA512

            c4179253360623338c917a317e657ad5b82d2fcacfa02b3eb0eee80029a8bd18608e2cb1f45a5f64acf95a5975f7550d064ca9d02bf7f51ea9f367ba3ebadf60

          • C:\Windows\SysWOW64\drqhikzqub.exe

            Filesize

            512KB

            MD5

            ed7f410ed38f097e42c999bacf8f6099

            SHA1

            8126ad683cbe59b2f1ae62dc6a6873de87b7dfb7

            SHA256

            f9b41bf0f4e3afccb434a538b7c0b9593746b5a2170a2b9ec7a9a87b621dd033

            SHA512

            10a92ddfe3b0bb050b1f6adf54ca0d93d6c175a493ef2c4940b43e31197e78ba9772d08ab5cc0790dceb0c4d76a49ee83df5fb844ed4107577c4c7a28746b81a

          • C:\Windows\mydoc.rtf

            Filesize

            223B

            MD5

            06604e5941c126e2e7be02c5cd9f62ec

            SHA1

            4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

            SHA256

            85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

            SHA512

            803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

          • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

            Filesize

            512KB

            MD5

            e848ae8c5b7b5290257ae059d627a2da

            SHA1

            63202abfb66481ce0f47d9eb9087131b1fb4d82d

            SHA256

            da444207b9081344b45cf25e505a66c66c96947d7b480e65b827885c1921d556

            SHA512

            065a61f401d5bc160c03e8b0e4898f1efc8059c235139a3c08a3e5efbb50169a4cc1342cc6cfd2b3ed28694b8903f9efb4c824cf000e6979893b3de0d52033bc

          • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

            Filesize

            512KB

            MD5

            90b322a0b7be01b1d1b2648e09645fbe

            SHA1

            e5365e2891b75d114551db550b2c2d44004cb528

            SHA256

            c178b205d4f8792cd4f930d76d70660a8a2ef6826bdeb173cc069d200825feb3

            SHA512

            8839e16fc5e178604e32512d3116918750608c060d875721f755e0fd5c058cc22fc5c88227b0b5810b933a2e79c046036216e8a57544540e072c396735a8659f

          • memory/628-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/1112-41-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-40-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-38-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-39-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-37-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-42-0x00007FF9B35C0000-0x00007FF9B35D0000-memory.dmp

            Filesize

            64KB

          • memory/1112-43-0x00007FF9B35C0000-0x00007FF9B35D0000-memory.dmp

            Filesize

            64KB

          • memory/1112-128-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-130-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-129-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB

          • memory/1112-127-0x00007FF9B5770000-0x00007FF9B5780000-memory.dmp

            Filesize

            64KB