Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 07:48

General

  • Target

    b26cca84d9629242aba661364a2ffb16_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    b26cca84d9629242aba661364a2ffb16

  • SHA1

    4ed0ad4594e0cd4219c9454f1c7f7a894415928c

  • SHA256

    56e07ee34411a08bc0f9e63fe3f8ac8bdd863594ac2f7a54f188c580f072fd7d

  • SHA512

    4a39400f42b43137e1d8e2b8ac8b12799ea778ab6513d2793b2a19b8aa432b77f29a3011939c132ae4fdeee1306ff594c76f700ced29183f8acf422c69981a80

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj68:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5/

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b26cca84d9629242aba661364a2ffb16_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b26cca84d9629242aba661364a2ffb16_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SysWOW64\uozrxyoyku.exe
      uozrxyoyku.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\SysWOW64\egunpgwq.exe
        C:\Windows\system32\egunpgwq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1744
    • C:\Windows\SysWOW64\hsyjoratwcadjem.exe
      hsyjoratwcadjem.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1288
    • C:\Windows\SysWOW64\egunpgwq.exe
      egunpgwq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2596
    • C:\Windows\SysWOW64\zxfdzvgwlwced.exe
      zxfdzvgwlwced.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2676
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      878e00bea8ac54f79599980adae66a29

      SHA1

      be84f629455b531fd59299e0457405513f5a3f94

      SHA256

      269932f1d8f2a605f1eec8f7baa56221fed3819a974e91b639defb1150740d02

      SHA512

      fb1f8baebc4ccaa98ab65bd49b66f3c2ec621c777e4a9f45343463b7670bebc2f9214752cfde2073d0bcdb1511fd85254421834b5bbed3589af9454179e740d6

    • C:\Users\Admin\Documents\RestartSend.doc.exe

      Filesize

      512KB

      MD5

      b9af665865bd44b281764da67f887a09

      SHA1

      add3f520d868e1364064bee7f1f726b4d556b4d8

      SHA256

      4a32dd30fa83489ea03a5b8428ed10810d8e2089454c12d85be69c78df7fc112

      SHA512

      ffe3540ca6c208c13c24a6f9fbb134558c64d0206492866bec5f6cf336ebef44b9e8bb16d16cc91372ea5650595cfae8f9bb6397077b9076823bdc12eef3f93b

    • C:\Windows\SysWOW64\hsyjoratwcadjem.exe

      Filesize

      512KB

      MD5

      a00944b403bb1eac7e5294adeab47aa0

      SHA1

      fa4fb9dbeff9478a60b3820678330919fad1a8d3

      SHA256

      10c04448df6c553d98affeb30147f52550c378704dda3923bcb0c8e9d5977436

      SHA512

      37f6f349457a2c99c815363b0e3799707ef0ce9c70c44e9caf18e172c68c654f526eef36e670471c0ac1d1615600b528c8457fdd3bfeca454a222fb88e389784

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Program Files\OutClose.doc.exe

      Filesize

      512KB

      MD5

      c78b1e748df0cbf736ecdb23e1b0ccbe

      SHA1

      464f4bd67e76178ecf8197e31b73bf9881aa7342

      SHA256

      4d09968028be55e4870362580aa93fc6715633f71bfa0a4f4919cef406fe6cb2

      SHA512

      8923feea6f3bf902ffab818f9cda3659544ce4e0dbca43379334f732273ff5c240c7946a1188c6f0652914fc3026ce2f4c9e0b76356c4c7cfb47b2ff26d9b3cf

    • \Windows\SysWOW64\egunpgwq.exe

      Filesize

      512KB

      MD5

      f28d0a5de0e9a95a217de527301cd46a

      SHA1

      48d27d6508170a6bd9f24219c1efafaa30552ccd

      SHA256

      84f00223d83ad822cd331a2160b00bff291d29eb3de3a21641fdc8e22d0ab1cb

      SHA512

      6cc7ae1a67cbf6e04247d576ae4fe0c29004a901981666e4a57152099f76bdf4c34bdc151d0f8f2126aa8a48589f4069cff67971a5de3ed77527329631d54383

    • \Windows\SysWOW64\uozrxyoyku.exe

      Filesize

      512KB

      MD5

      f0de2a0e3952dc02c0931e424cad4ea0

      SHA1

      392efcf0ae380b428eed813b849732ed6322f667

      SHA256

      ab2fe53d50ec4f6293be142fbc58e5420658d3c040d9f405bb1f4803ba5cc6e1

      SHA512

      d7ab51b2fb2afcffa6c76299dcf68acdb3c34d3d330b199c0abb77ec8ef124b9d5657f4b88d4997f1ebabfa7dba00e12d11883f25200c3e2b63edfb7178a0453

    • \Windows\SysWOW64\zxfdzvgwlwced.exe

      Filesize

      512KB

      MD5

      216be3aaf0714bf5cf0146e068d289c0

      SHA1

      ec9f07f27b7c0b3ed62d0869a8d7be000391c528

      SHA256

      0a5fda83bb98a3cc30f69610185abae71d8024f654a737ae4391ace454599506

      SHA512

      e5b8f6d518c460f00af31162e0492165681cd6ac25fd03474d0c2ab0b96a842dcf69c02772b255539a441cd381edefe7627a05d5ba8022c35a6395f3fa8bf6dc

    • memory/624-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2400-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2400-102-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB