Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 21:19

General

  • Target

    ab8414edc043a9d6f7804170942da343_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ab8414edc043a9d6f7804170942da343

  • SHA1

    fe801a8dc6c43bb30ba4a6bff33532d33230750e

  • SHA256

    b7074d4785ff6c3f9900363972d6057ed004287fb7605e086c2ed644628a739e

  • SHA512

    a1a9e0c981f43c26b9785f8dbb9e71d4ee412b168c2333238bc9e06a7a0d6f12594e8e5ba0665cef95df9c72f096bf83e4e1c5f816d2e1dfbdf6725cd52230ef

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6+:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab8414edc043a9d6f7804170942da343_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab8414edc043a9d6f7804170942da343_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Windows\SysWOW64\yndiwydjbq.exe
      yndiwydjbq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\SysWOW64\pxdjzvun.exe
        C:\Windows\system32\pxdjzvun.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4700
    • C:\Windows\SysWOW64\rcrduzcezemelxd.exe
      rcrduzcezemelxd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4076
    • C:\Windows\SysWOW64\pxdjzvun.exe
      pxdjzvun.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1260
    • C:\Windows\SysWOW64\olssytlctcuoi.exe
      olssytlctcuoi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3296
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    827384cbe43021fc32e7ed4ce27613d4

    SHA1

    0f67133def70388fd3ee22f09f33b4f5de823544

    SHA256

    7ebb207ca6ed637d075611265058823d0e5bc086c266af65b1029f173ff6b00f

    SHA512

    922c99b240aa147cda81084cc05d9e294612404aa84a0e478a2fd975359f7560bd1a063539892a6bfa9707d04be49afafce97da1e280d18355887ffba80aeb30

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    2a0e823c4613c62437e84f2da2b7f975

    SHA1

    99214688f00745ab8dfe1dcabb0732625674ce5c

    SHA256

    339c30308b71d70c3587f1f5f2ec700db15c4587b7e922f7878d06b59c8dc233

    SHA512

    db27112b119df14e6903874f632ae79dad04d4140eead1726b499e5308f0673c761179cc7c6ca29dedde73d59d6d38b28affb592f0cecc80f3b853279986c321

  • C:\Users\Admin\AppData\Local\Temp\TCD950B.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    84dd6473c996617a5b09de82c70df8a2

    SHA1

    207efaadf7b06337047aaeb25bb962132bb19f6a

    SHA256

    6607dac17be0b105e78da918bd1418e87d1747ee4dde7c582fd2b793928230a3

    SHA512

    7e1e1905480db31337a07b14ec439daa6c5b98d425a0a91f1f9ad24471b834e163280b37ddba9b34bb0886ce223ecbd51ea1ed2b7f129b6291fcf2fe1e5374cc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ad250928b5bab251a138d1cb086f96dd

    SHA1

    14241369de60cb9a9c3b38f6ad7752ecff40f094

    SHA256

    d696caafb2f533c99c4ea3d0bb85cd3fe766d69ab25bb13b906b0ac79616a2cc

    SHA512

    1933428707b3295aba49fb58072668579575ce41354d37c99e4f4491b7f8531931cf49dfb84e2b283884ca8d2be0b4dca8dcb1e3681c29790e9139cb2cea2547

  • C:\Windows\SysWOW64\olssytlctcuoi.exe

    Filesize

    512KB

    MD5

    fb4b4c82c885deeb2dcfdd61b7d4773e

    SHA1

    71d825a8a9657751654c65b8cc4bc8b1e0d67ddb

    SHA256

    4ae43a385915aa5753377dfff8e026404a6237089611b901357a6d032868f1be

    SHA512

    620db42a9d39df38d2b255a729abab89aa3c47fd688dd7cf677f4d69c02b73aa0e23db1da3fe1b05128ffb9095cd7e9f1af0a9d450f4a4f1cf6bb35521cee7b3

  • C:\Windows\SysWOW64\pxdjzvun.exe

    Filesize

    512KB

    MD5

    6458fdad028ac8c4e6b07534adda039b

    SHA1

    80c7f8b58317789ec9656bebf0d3256cbb194bbb

    SHA256

    0a14ea4a8e08eccb32f4177c4c77c0807213eaed881c01410a62c5bba8f72a82

    SHA512

    56659e91ba5c87c933eb3f3d53ccd6e16e9f15a2352c7ce5f93ceeb20d8e948627b058ff30b425df62311c4613e86b3152acd4114f10944e1d5abb36698e298f

  • C:\Windows\SysWOW64\rcrduzcezemelxd.exe

    Filesize

    512KB

    MD5

    2336365e596d43de0dcfd0b65e524e7f

    SHA1

    9e45cc18cc1c1cf5f8e3a4a2a007e261f95922cd

    SHA256

    ae4ea0a8fc7023c9fb81a1bc6dee6e4cc9f7532c2b416587fa2b0109b92af0d6

    SHA512

    c45ae8e4108d7ffa1dfbd51c93a993f14c402ca8438f3632c00016467839d83264772116c8509939ae0731c435761f5e5218ecbaa116194303eac9118702978c

  • C:\Windows\SysWOW64\yndiwydjbq.exe

    Filesize

    512KB

    MD5

    431060c69ed1092bc6724482f5fbf822

    SHA1

    160d8899c78aa11551dda54a6674c5b8477cb5e9

    SHA256

    388830dda7e84e1e3567ec1f03e3a9410c85f54d756d1cad08a0f53c7b464054

    SHA512

    c8ea624006d0370b1490b81108eb037c0996dfce34353d3c1654aaa433b26fa6e72a7d576027241f6f7f95c62fe815bbacda5cca61c92f5ab6623d870b1a523b

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    8665b114f2cb6a155cd58b5f5d640fb3

    SHA1

    7941d2144f03dc6f97c378119191b56c263d15f5

    SHA256

    5b12b0480e2eff6c9ac13eacb695853f1db4d36bc7044d79f45029c8e9c7000a

    SHA512

    f817251d7926e49ae0790fcc86cf2a5aac4643843a8e55feca038d2751cf15f5e1ddca7e92eff5ec3c3b95c20be27d73783ad297b7bc96351fcbb38516511a3b

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    2b7cc5b512dd17559317f92a88722e15

    SHA1

    464f684da8131635e63df10deeab496a56bb988b

    SHA256

    8e78ad332a793c67ce85dd2799eae8f7e419e4511ae6b670c673efeef92c6d10

    SHA512

    2f7511a8be8f31ff905d023ccf333d5c95c2b6adb08a51bbe761354a6bd646c2af6ff5a6317f9bc1ffbe7938f6b4717b679931f77a6adf2979ae28db331b053b

  • memory/2768-39-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-42-0x00007FF97DFF0000-0x00007FF97E000000-memory.dmp

    Filesize

    64KB

  • memory/2768-36-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-38-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-35-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-37-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-40-0x00007FF97DFF0000-0x00007FF97E000000-memory.dmp

    Filesize

    64KB

  • memory/2768-597-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-596-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-595-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/2768-594-0x00007FF980350000-0x00007FF980360000-memory.dmp

    Filesize

    64KB

  • memory/3720-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB