Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    17-06-2024 10:40

General

  • Target

    b830a4a93b61e2df3e0d02c67b949c62_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    b830a4a93b61e2df3e0d02c67b949c62

  • SHA1

    e655d0973671318dbec4fe57286a3dfb7befdc7b

  • SHA256

    3296603c5a39149bf2c9d787f04c4246458e884c5e1ded44c32f4d59bc9bd589

  • SHA512

    2c177cea39d30841c35decd55d5e3fbc0953d55354f176fccb0969778fe06c09904d34f5f7f1dd68fb42f5d1bcb3e9fe6e4620f6847d859ea395b70712842386

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm54

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b830a4a93b61e2df3e0d02c67b949c62_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b830a4a93b61e2df3e0d02c67b949c62_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\jbvslvywhq.exe
      jbvslvywhq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\SysWOW64\fzksnnhg.exe
        C:\Windows\system32\fzksnnhg.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2816
    • C:\Windows\SysWOW64\jjmuchwfykneuul.exe
      jjmuchwfykneuul.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2684
    • C:\Windows\SysWOW64\fzksnnhg.exe
      fzksnnhg.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2760
    • C:\Windows\SysWOW64\bwvnhvvducqlp.exe
      bwvnhvvducqlp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2700
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      d659775ac25ad9fef4eafa97d2b9571c

      SHA1

      198b38665fa1ca723da0390345d9f70d9226d1c7

      SHA256

      2663b35bfc1365a3ed055710cac70d0335151097325fe6b56cd1847dd39762f1

      SHA512

      11ed84b0793169dcf9db85f798e952f6fe92d77efa0cc9663c6d90879fbb83c2384f0ae6af3874e281037be6d91d9d1d84fbc4e1b136243a2766804a7d43eb39

    • C:\Users\Admin\Music\DebugSelect.doc.exe

      Filesize

      512KB

      MD5

      6d636ee168462d9e69de2ed86761fefc

      SHA1

      59cc42d4b9de6c46705eedad2e6a191d1778f998

      SHA256

      e73015422b4aea75383c4687dc8ec2989a9ab315049bb35e411b05e38669ae77

      SHA512

      de52eaf2cc90cca30a0e1913ebecf6c5b683f072598d1a1378cfdf17fe4816c2dbd435618aa416903f7c54b03ffdce74e544ade44bd778f32ce7eeb01c07e7fb

    • C:\Windows\SysWOW64\jjmuchwfykneuul.exe

      Filesize

      512KB

      MD5

      ebaeff68ef08c414b908324a9422d6bf

      SHA1

      5229fa1ee662e58ae3246a02b8c2e1392dc9394b

      SHA256

      bc8fdb38944d1c7ff94edcd642b266d388b27a9a00f1257df680b1fc904f4854

      SHA512

      aee10f651894155ae0a1119ff3596a60ca063da5d6a5890b5fdfdafe300b30e1c1fdd309d228258bac79ed6b916d6dea29ae81ee9db308185b9ffed9cbb363d2

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      a78db3045fe060a64aeee43521f01e37

      SHA1

      916e424a20a322e01524e48e34f514d101dbb904

      SHA256

      dd99553c6a3d873d0ce666e282d6f5b964d86d9396f10e773d6e5e15455948cc

      SHA512

      eeb66cc0315ab35e532dd5fc5f1d8682d03b57b48578566e440b1fd8b0da126ec8126c54dea32b3b9925074726f60c3b9cc085c810c813ba78caa09238624c93

    • \Windows\SysWOW64\bwvnhvvducqlp.exe

      Filesize

      512KB

      MD5

      34a1a4d8ab7e8a77928f393dab53545e

      SHA1

      87d36988cb7ad6820bda65210436db4fe3157382

      SHA256

      73fa71cf240932c61211108edf196ade5b27e367013815efe46a66dd4413c2af

      SHA512

      9ea6ce6fcdef24a7b3183b4d5a1f42061344810f61a187eac1e2aa20ab1897dca9238dbac6e935562175d1343eed48401db0a51fde8ed79eec812116d012dce9

    • \Windows\SysWOW64\fzksnnhg.exe

      Filesize

      512KB

      MD5

      ca005ae243c11364b0f1720b25280b0c

      SHA1

      996afd90a1dfbdee6f245baa7f684343199fc4ed

      SHA256

      2d62294e39add52c8612092d59ff8c1a912d10ddbd1f7efb8ee5c8691e92e16f

      SHA512

      92875a564079c3290998c185f73f36948e9f1ebe6004de5d7178c8ead10b527f57316fe3000e95aeadc0c32a51ce25b6b2d371758ca98d0f8dde1a584896153c

    • \Windows\SysWOW64\jbvslvywhq.exe

      Filesize

      512KB

      MD5

      bfb9726ee16c9f95a05ec860ab7ae08c

      SHA1

      70bb132f3354893bca87333203197b814569ed70

      SHA256

      f2a5f655dfaaace4f3c9790192b8579f2d12ef8b2f4357587a9bf5c5c0ead8d1

      SHA512

      49cf4a560e1e13785c10d749234df60402d9121abf636f9c7c234adff0bbac3a4af3b4c6e267c67577ce62348ee8b2447be13948e732b5f11b198b3b4d188643

    • memory/1040-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2708-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2708-108-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB