Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 06:23

General

  • Target

    b21cf75d3af35edff90548d77f47ed24_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    b21cf75d3af35edff90548d77f47ed24

  • SHA1

    33ee13f7b0bc65413d341f17fced080da3e2572d

  • SHA256

    0d78f3d3721275e6f861b09f7f0f20d1cb83da011cf3ef1b6d3265e2928492d6

  • SHA512

    410b1ed4f22290f4ef06ebcfa4d92cd5bfea2c19b862d5a35a50e33ba650f2eb34a28f2b040413cc638b2fbc6b023a2983abf596df6c316d5e1d57f0a9e93b6d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm52

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b21cf75d3af35edff90548d77f47ed24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b21cf75d3af35edff90548d77f47ed24_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\SysWOW64\okpchcpant.exe
      okpchcpant.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Windows\SysWOW64\xjttvpws.exe
        C:\Windows\system32\xjttvpws.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1908
    • C:\Windows\SysWOW64\xrqyqwpomnxlvah.exe
      xrqyqwpomnxlvah.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2712
    • C:\Windows\SysWOW64\xjttvpws.exe
      xjttvpws.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1656
    • C:\Windows\SysWOW64\egqpboqgvovqw.exe
      egqpboqgvovqw.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4072
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          bbb052ee9d91cd5fd36a459f90e37cbd

          SHA1

          b52bee7135b4e9cb3c09a83f4c7afdc52d38d491

          SHA256

          8d90145b6b769088261d510c4c839139219e004632094cdb0afe4f030e3e74d9

          SHA512

          47bd58c21653c56edff757f38cff472f91241cf440d689b0c058c6c7b52a098997103cabfb532c672c032073f833a064b4af996037cff8977f9f3f2a3ae14169

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          45aae1a4c95ccc0c77957cc02897729d

          SHA1

          fc241907aec1e217514105880656153d23cad559

          SHA256

          b038e81597681b12390599b979bde2d6e3c8c93b178112e15140466a933063fd

          SHA512

          6d5a1e13601a92ea9fcafee66329df5f23866e2764d2f9a71c83e4e09b91e8733589c23ef8e791a98a6351b27ab28312a843fc9c8a65a1115b3f4ea20314afae

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          b13447b1a217d1154604d45889336bdb

          SHA1

          00cbf27d7ce3f1b45090e05d1e2f48b8f13221fb

          SHA256

          e69e022437f3fd5216eece395f3cc80a8a95b83b2297b191c40ea40a90f9ac96

          SHA512

          ca82d72f017c747d2d959c7492af3951e5800d09a489b860b4377fcc09099327b90f14312ae85c2670d0e2bcfc33d0fa49197b6d3cdb99c9b8871f5baf6bc86d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          253639ef6fe7c65c56b844712a99f7ac

          SHA1

          b1e59a68e9682c5d274852f93c50c387ba35b23a

          SHA256

          7d63d8f9a1fa86d1e34eafb99c612cdd6b0e43281d48d9e17868ddc7b9febaf9

          SHA512

          82fbaedb8fdfc245e4bc704dc0f076d703c27dbd6bdb6002325a8c84d05cfea5d7bab15137188c1bd92ce7aeecbcd5f40eae7899d4d13f7c93b08de4cfbe7da8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          a980c91751a4ca5ef882428db95a984e

          SHA1

          413a4a2ecc4cf9878c05924172db8245c8039927

          SHA256

          37fb57503a3840b5240b70140d7c3ec2b74c952fa5131fdc7044032e89c03273

          SHA512

          43dd6aa6ecf9c48b98ce4677dcf2d27c86ab8f03d9de7d40332d36ad0f784214850906d4cdbf0f9c3358d716a5a60aaaba439babb92ebc6325795aa7b2a7bfc6

        • C:\Windows\SysWOW64\egqpboqgvovqw.exe

          Filesize

          512KB

          MD5

          b6fbf45ddaefd5377f65e2fccd6d78e3

          SHA1

          7db2da2f34d73c22b5f6e46defa05e9995782e80

          SHA256

          c66c0b890e58dbab52a4f7d740313fb9a84773a34e6c02c3ff18e14554d09f83

          SHA512

          133cc2e764b357d6d28068ae684b1f0a75ab43c96b959b23ecfacb30839692cdd94a61aa588795be0234e50a56d21f493616c47d3049b41bfcda1b88e1584e4c

        • C:\Windows\SysWOW64\okpchcpant.exe

          Filesize

          512KB

          MD5

          12c6a94818cf6004bfd3306353b023ea

          SHA1

          1db9e399c9ba1504f5f3bfed8d9422b35549aae6

          SHA256

          b4474d07afc2577c7aba12d3c515819fb249a50652408f97ec0e9076f44899d9

          SHA512

          2b2a292c47a30d533996bf6989c7e50d9166104d7b88858034172b767acda4e422e76b75dbaf2a98f5b52f092a928f79e7c70acf39bb482fa16bcd4c39f752f7

        • C:\Windows\SysWOW64\xjttvpws.exe

          Filesize

          512KB

          MD5

          5022ea744ea6ee13b7dd036e3aa00607

          SHA1

          5503e0d213a30b1e3289cab7966f0c55172b8a0f

          SHA256

          4fa3f6529e1e31478eabb2f435cd98c2abca6741f5d2c573b2c2b60eaf5bbd2f

          SHA512

          01b6c1348d973ca2b0e5ec6785c7edb7cadb68b57b7dad79503f5fb376eff5d029ff211f02e1a6caf4f8da6d2d08cd94001822d035915159fb1f81e685accc0a

        • C:\Windows\SysWOW64\xrqyqwpomnxlvah.exe

          Filesize

          512KB

          MD5

          a98e6369f83dd23ce5f0a62a8bcfab16

          SHA1

          c01488d9b465b668d4e1d3759b552c72f38e73a5

          SHA256

          30f1f1487e2e3e5768c44fa5bfe3d1813aeeb8f7a43dc286a9730b870fbfad4a

          SHA512

          735c1447571a9e3cb6d47f6d61e758e34dbe4bc2da8447eba039312e111b242c555d3a9e10fe032c99fabcbeb1a9b272ca2ee1dfc6c619542f77e33dfa350e9e

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          53f8100c39329afdf90643da65caad16

          SHA1

          4061e24a3fd9b060028daecd0af162640a129faa

          SHA256

          0371f99de17214bff7693878f7b280080885fabe452bd75208f9334e35e0d5ba

          SHA512

          4a6ced593978a54a2100c736239cb961c567e41d194a7ac52461b327e8ea5adf2f2aada289fd13ae66bbc43472c4d2609738c390c0c62ba7e8aa0782d325d12c

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          87b48419326ed2f19f2c237d7d75358a

          SHA1

          609505864c9cd02030c99bdb68572f8634f3f9c8

          SHA256

          1b3b81bee12c7d3ddc99ecab34ca382ed8a73fe55ca8f6ffe3947ef886bc3675

          SHA512

          4e2d5f1811aa5809fb43681c1a9ff4f248b33eec2354091658f76e2cbd12565c89c2f9c8a1c18065971d14e16c58391c3f8164218afca4d33bca8ba9e92e4ce0

        • memory/1608-35-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-39-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-38-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-36-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-37-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-43-0x00007FF7CB710000-0x00007FF7CB720000-memory.dmp

          Filesize

          64KB

        • memory/1608-40-0x00007FF7CB710000-0x00007FF7CB720000-memory.dmp

          Filesize

          64KB

        • memory/1608-114-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-116-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-115-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/1608-113-0x00007FF7CDFD0000-0x00007FF7CDFE0000-memory.dmp

          Filesize

          64KB

        • memory/2592-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB