Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 07:48

General

  • Target

    b26cca84d9629242aba661364a2ffb16_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    b26cca84d9629242aba661364a2ffb16

  • SHA1

    4ed0ad4594e0cd4219c9454f1c7f7a894415928c

  • SHA256

    56e07ee34411a08bc0f9e63fe3f8ac8bdd863594ac2f7a54f188c580f072fd7d

  • SHA512

    4a39400f42b43137e1d8e2b8ac8b12799ea778ab6513d2793b2a19b8aa432b77f29a3011939c132ae4fdeee1306ff594c76f700ced29183f8acf422c69981a80

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj68:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5/

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b26cca84d9629242aba661364a2ffb16_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b26cca84d9629242aba661364a2ffb16_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\SysWOW64\cvouzxcmlf.exe
      cvouzxcmlf.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\SysWOW64\rpdlynlg.exe
        C:\Windows\system32\rpdlynlg.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5572
    • C:\Windows\SysWOW64\besfxwdyofxawfz.exe
      besfxwdyofxawfz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5552
    • C:\Windows\SysWOW64\rpdlynlg.exe
      rpdlynlg.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3536
    • C:\Windows\SysWOW64\ivajszsflmfqk.exe
      ivajszsflmfqk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:700
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5768
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4468 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      ed61d733f76f8eae55d0a42b2a85a6f5

      SHA1

      0151fe8cf987c07633be631192225fa069853d28

      SHA256

      0cdf6a01934e2c5f6d51fff5256596355cf064f5a62bf927d9c7ae58115a0e04

      SHA512

      578c477d54948c835355bb30ea6f1f8cab3ae254b2f6fe5933e698f8126b8c12c97adc98da1ebcff1520d1695132dff1d6c38efd8ace73dd82e0d0e0b4780061

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      ce9663be1d6cbc3b26a1edcb322157db

      SHA1

      d47bc658fe5d3ac17068470b256f5f84e4631f7b

      SHA256

      d6cdf1b31db1d80a6b58aae2aeafc0884c8549c3df423a46aea4dd9cbec53c5f

      SHA512

      e555182265b48a32951dc5d79fb03d07e58ee66bb138251f4cfefe87383ed9b47151e98c0c469c581cb427dbec0636ce592bfa003f5f5e7eacc81f39f9a4ec56

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      751743bcabc631d08e1b3f6ea8219734

      SHA1

      8e7ef10dd7f0b452a19c3b101e79932474336817

      SHA256

      1bca3a6751e4332e1c2e0f67f9b6def17364e36c724610e37f6e11089ead3a69

      SHA512

      83a5b1b7dae6a078c27072e4ad2621110d4a9739b45d421e8cdfc615240b99bff5d05bab187a126b562147e8bdd92e7011d8eed5fb990fb7cc8d0e310316bd49

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      a261b8dc4cbd15ea3769bfa7452af426

      SHA1

      6802a5c686bf99ad08e24d862b83e2e56e1eef4c

      SHA256

      fe093afc4e33046b4ec72da1c6b7cebe2fd85b90e0b0d6708968032b72487173

      SHA512

      19fa760d72a400efeff66b06e7f7181b57801ba0a5f22345302c31dddd02f09c7ba46b6c2f56071d2e2eafe58b1ca50c0b88b0aa34a24f0f1cc87abb69431faf

    • C:\Users\Admin\Downloads\ClearConvertFrom.doc.exe

      Filesize

      512KB

      MD5

      314c3bc8ffd7c4b179ff6c1a6801e5e3

      SHA1

      0e328cc781d2106df23625da6bba047ca63c4042

      SHA256

      97353cccf5e416413390725a36ef504942200a34aa6e3bf3add708d726137baf

      SHA512

      74748faa668bc9f5e81be9d84f764973a068926d4e0f49e1307714c72fbe23121558679a15e21f1c8526e8a4f1f99071c511826070f148092c4c2a2574e757c7

    • C:\Windows\SysWOW64\besfxwdyofxawfz.exe

      Filesize

      512KB

      MD5

      a72969a5aede5ad19ebfd1939e2d0b39

      SHA1

      a3ebae6033d19b745c7d8091668bfd1a37e706b7

      SHA256

      7260f19251ce1cebaf2db5075f4eb06684877c4d1e7f9c09279d932adb30606e

      SHA512

      5ae6d9974d2c14f42d10a7fb4c4087fde03689ea175c250e993561e95c8ff045ae6591bbee79c7b6c3c1f947e83a20acada4bae0af2b31cb0b81e294d25164ba

    • C:\Windows\SysWOW64\cvouzxcmlf.exe

      Filesize

      512KB

      MD5

      ce6d96f59ddaa0b3fafe3bed40a7aa75

      SHA1

      4d276ec5b28429e71f8b85019a4ad3b1d1adaab8

      SHA256

      6596590eb1c783361add864a3cd5d2f0687f626414ab346c41152570262e1796

      SHA512

      5e24fc1cf87d65562c23ab465bfd67a8c04e83ad0ffb31b7faa4e7edeb893e98d09e5f3aa37602ebbc8471c0bd7beef3d6b90bcdc0d3c64510edbc88d87ff1b9

    • C:\Windows\SysWOW64\ivajszsflmfqk.exe

      Filesize

      512KB

      MD5

      673e5953754d6f2366023ad4e358894d

      SHA1

      9df98232d1f5f406c2a5de0a65e74f4cc0077488

      SHA256

      bdda5b612dd426d1274bd7d09c0fe46bd9b93a9562664b67189b22b05d9ca23d

      SHA512

      1d4f1356abff736b19a1f493537476c3262a7af0c95e3bdd50803d1dd826a5716dc2dcb17de1c3e5fe6fcd15487274246b2df511ab1961c59df4a878f49a54eb

    • C:\Windows\SysWOW64\rpdlynlg.exe

      Filesize

      512KB

      MD5

      22b48f338e8d6d1aa6b5b9cb7bbf59b2

      SHA1

      ef833fe9c145e40eecacf0cd534f9c281c8758fb

      SHA256

      d43534b80cc5741237674bce1e673917c66e2469660e8493ab227322fd0f59ed

      SHA512

      4833a3def34cc539e352649aa4d65200ec468dfc2f44c09b0f92783974eb2399c6c986c7fcb277b14175243f42901a9f26465b14f6054555577a6c2c11d0e7b6

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • memory/3544-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/5768-39-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-44-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp

      Filesize

      64KB

    • memory/5768-42-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp

      Filesize

      64KB

    • memory/5768-41-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-37-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-40-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-38-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-110-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-109-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-108-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/5768-107-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB