Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 08:59

General

  • Target

    0d76e4f59f4691f5ea967d5f4d7a6267_JaffaCakes118.exe

  • Size

    255KB

  • MD5

    0d76e4f59f4691f5ea967d5f4d7a6267

  • SHA1

    3eae6883cf8f8bd6839892a9767b9ea7620ea1db

  • SHA256

    a28c9c9c695f3504b58cba5793a62f56381b1f3f272fb278e680aec5e7e9bfa0

  • SHA512

    70a3a2ee6c41ff18cc136404f926a082ffb35014eb3148b0b66cd70e8407d87eee5d9c6925e40ea634c6ebee715cab112099ba21b0e371d808b478eec20ffd4a

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ4:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIN

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 57 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d76e4f59f4691f5ea967d5f4d7a6267_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d76e4f59f4691f5ea967d5f4d7a6267_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\xmqkbraacf.exe
      xmqkbraacf.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\SysWOW64\dinrnuxi.exe
        C:\Windows\system32\dinrnuxi.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2624
    • C:\Windows\SysWOW64\mwfuwtozcbxwewu.exe
      mwfuwtozcbxwewu.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2676
    • C:\Windows\SysWOW64\dinrnuxi.exe
      dinrnuxi.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2832
    • C:\Windows\SysWOW64\tfugzcmckwtmf.exe
      tfugzcmckwtmf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3004
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2472
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

          Filesize

          255KB

          MD5

          3f0ade6873a82d988623301ce7530285

          SHA1

          5fae1557903d0f89e42d7daa3b468a07a6fe7ad6

          SHA256

          16c8ee08b05b0794ea27bb93377674a5709f95b0b7378b745bbe42439d718eaa

          SHA512

          2224c5dfbbdaf1bae0f07ddde684dd76d6b9e2ee255ba6a8c26f769d2b7eba1942aafbad062a59cc18e2601c327aa7efc520c22a8063a01514af0c0af9c37663

        • C:\Windows\SysWOW64\mwfuwtozcbxwewu.exe

          Filesize

          255KB

          MD5

          9d54ee77bdd05afb655b7f695d8dffe7

          SHA1

          8e4527f022441a00f3b5ead3123ff9277cbfc438

          SHA256

          247504635baddd4ecf9c878852fcbd3239238039e19dfbd51c5a20f7f6e03325

          SHA512

          762d93cbe37432c0c2ba4263204b2d574bf22a7db2ffc03dcbfd5af5f9d9312c5e3e165fa1875743d6332f2c1d90d871465118f07961f36eed024ba87c897454

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \Windows\SysWOW64\dinrnuxi.exe

          Filesize

          255KB

          MD5

          6f70ba439519e6a6d7e8a5d1970e13fd

          SHA1

          325362da4d7c10884c31bf3903cfcb3cdf01d94b

          SHA256

          4c323b3a32c38eba505661a019dfdc6eaba806d5fbcf32b5418cb8a2ebe5fbd6

          SHA512

          e899bfbbf1c5792d6882ec663670219518ba4799643568d7df53e6d54dc1f8a23a3d22035de1fb10af8e05d3acdcd3bdd2c7223e81679859fce2f03b125f0119

        • \Windows\SysWOW64\tfugzcmckwtmf.exe

          Filesize

          255KB

          MD5

          49b900fe338f6d52a2f0121723671803

          SHA1

          dc01bf2b12b2f1713c44318f8c97d44c05cdc30e

          SHA256

          377c8b61684ddc2389d9770e410927add1a7415d3dd5760f0ad43a21ca4b773d

          SHA512

          d8b1343d9bc34d1cd9afa2c7eb348a702c4d48d75fa059688feae9366a708815f2b5c3837580a4401e95f44e964ec93a1eca82b75b55d007f48ce8986d8ff0a5

        • \Windows\SysWOW64\xmqkbraacf.exe

          Filesize

          255KB

          MD5

          9764204a178260837e3f1e9cbe5b0277

          SHA1

          feb5e2851c1a267d78d91b7525bb9c7ace11ed56

          SHA256

          40dca5ef1a0d532df72a93eefffee2ff61282141a95bd25e56db336fb3c40415

          SHA512

          90a9dc1838c9811d458d00884df2967c1ec13be5fb5e92ffac915e9dfaa44b81cf8b539b29151425791e9d8624d1141571375c6aaec3aea47fdea92b60550054

        • memory/2112-47-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2112-18-0x0000000002ED0000-0x0000000002F70000-memory.dmp

          Filesize

          640KB

        • memory/2112-30-0x0000000002ED0000-0x0000000002F70000-memory.dmp

          Filesize

          640KB

        • memory/2112-0-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2236-133-0x0000000002960000-0x0000000002970000-memory.dmp

          Filesize

          64KB

        • memory/2472-48-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2624-80-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2624-45-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2624-90-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2624-93-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2624-88-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-131-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-119-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-128-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-77-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-82-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-125-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-85-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-122-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-107-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-99-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-113-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-102-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-33-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-135-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-96-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2676-116-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2832-38-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2832-94-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2832-86-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2832-78-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/2832-89-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-97-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-129-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-136-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-100-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-108-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-132-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-79-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-103-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-114-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-126-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-117-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-83-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-87-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-123-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3004-120-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-121-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-84-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-118-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-124-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-95-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-115-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-127-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-112-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-98-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-130-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-81-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-106-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-76-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-134-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-101-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB

        • memory/3064-27-0x0000000000400000-0x00000000004A0000-memory.dmp

          Filesize

          640KB