Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe
-
Size
512KB
-
MD5
be7d9ce3b6de692964c89664b7d98dc2
-
SHA1
5e9409d102f6ee6fb39d5917b1b5c711e31b3299
-
SHA256
450825dc28aaf7b11a29bf1fe924175154202cacf45505678d7ea2cdc2e68af9
-
SHA512
4e00bd1deb34df08610491036864176e1e2a70dad24f15528ccaba20ac345a1de29127861f1060e1773a541bf460124db2d7f5e12349828c90fb50a4fc4e5e05
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj64:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5X
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ykixbeympo.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ykixbeympo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ykixbeympo.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ykixbeympo.exe -
Executes dropped EXE 5 IoCs
pid Process 1984 ykixbeympo.exe 1668 fflkunuxlmaoxwx.exe 2292 vfvzmbcv.exe 2828 mjcmpldgomalc.exe 2892 vfvzmbcv.exe -
Loads dropped DLL 5 IoCs
pid Process 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 1984 ykixbeympo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ykixbeympo.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fatxummg = "ykixbeympo.exe" fflkunuxlmaoxwx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\overiopf = "fflkunuxlmaoxwx.exe" fflkunuxlmaoxwx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mjcmpldgomalc.exe" fflkunuxlmaoxwx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: vfvzmbcv.exe File opened (read-only) \??\m: vfvzmbcv.exe File opened (read-only) \??\h: vfvzmbcv.exe File opened (read-only) \??\n: vfvzmbcv.exe File opened (read-only) \??\w: vfvzmbcv.exe File opened (read-only) \??\q: vfvzmbcv.exe File opened (read-only) \??\k: ykixbeympo.exe File opened (read-only) \??\i: vfvzmbcv.exe File opened (read-only) \??\g: vfvzmbcv.exe File opened (read-only) \??\h: vfvzmbcv.exe File opened (read-only) \??\t: ykixbeympo.exe File opened (read-only) \??\u: ykixbeympo.exe File opened (read-only) \??\w: ykixbeympo.exe File opened (read-only) \??\z: ykixbeympo.exe File opened (read-only) \??\a: vfvzmbcv.exe File opened (read-only) \??\s: vfvzmbcv.exe File opened (read-only) \??\b: ykixbeympo.exe File opened (read-only) \??\l: ykixbeympo.exe File opened (read-only) \??\n: ykixbeympo.exe File opened (read-only) \??\u: vfvzmbcv.exe File opened (read-only) \??\q: ykixbeympo.exe File opened (read-only) \??\v: vfvzmbcv.exe File opened (read-only) \??\g: ykixbeympo.exe File opened (read-only) \??\j: ykixbeympo.exe File opened (read-only) \??\q: vfvzmbcv.exe File opened (read-only) \??\y: vfvzmbcv.exe File opened (read-only) \??\n: vfvzmbcv.exe File opened (read-only) \??\w: vfvzmbcv.exe File opened (read-only) \??\i: ykixbeympo.exe File opened (read-only) \??\y: ykixbeympo.exe File opened (read-only) \??\s: ykixbeympo.exe File opened (read-only) \??\j: vfvzmbcv.exe File opened (read-only) \??\e: vfvzmbcv.exe File opened (read-only) \??\p: vfvzmbcv.exe File opened (read-only) \??\a: ykixbeympo.exe File opened (read-only) \??\r: ykixbeympo.exe File opened (read-only) \??\t: vfvzmbcv.exe File opened (read-only) \??\x: vfvzmbcv.exe File opened (read-only) \??\p: vfvzmbcv.exe File opened (read-only) \??\s: vfvzmbcv.exe File opened (read-only) \??\v: ykixbeympo.exe File opened (read-only) \??\g: vfvzmbcv.exe File opened (read-only) \??\b: vfvzmbcv.exe File opened (read-only) \??\y: vfvzmbcv.exe File opened (read-only) \??\m: ykixbeympo.exe File opened (read-only) \??\o: ykixbeympo.exe File opened (read-only) \??\e: vfvzmbcv.exe File opened (read-only) \??\k: vfvzmbcv.exe File opened (read-only) \??\i: vfvzmbcv.exe File opened (read-only) \??\r: vfvzmbcv.exe File opened (read-only) \??\v: vfvzmbcv.exe File opened (read-only) \??\e: ykixbeympo.exe File opened (read-only) \??\o: vfvzmbcv.exe File opened (read-only) \??\h: ykixbeympo.exe File opened (read-only) \??\t: vfvzmbcv.exe File opened (read-only) \??\a: vfvzmbcv.exe File opened (read-only) \??\l: vfvzmbcv.exe File opened (read-only) \??\o: vfvzmbcv.exe File opened (read-only) \??\u: vfvzmbcv.exe File opened (read-only) \??\z: vfvzmbcv.exe File opened (read-only) \??\p: ykixbeympo.exe File opened (read-only) \??\x: ykixbeympo.exe File opened (read-only) \??\r: vfvzmbcv.exe File opened (read-only) \??\m: vfvzmbcv.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ykixbeympo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ykixbeympo.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2692-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0008000000016491-5.dat autoit_exe behavioral1/files/0x00090000000120f8-17.dat autoit_exe behavioral1/files/0x0008000000016591-29.dat autoit_exe behavioral1/files/0x0008000000016610-35.dat autoit_exe behavioral1/files/0x0002000000003d26-63.dat autoit_exe behavioral1/files/0x0002000000003d27-69.dat autoit_exe behavioral1/files/0x00080000000160d8-75.dat autoit_exe behavioral1/files/0x0007000000016c49-81.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ykixbeympo.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File created C:\Windows\SysWOW64\fflkunuxlmaoxwx.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fflkunuxlmaoxwx.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vfvzmbcv.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File created C:\Windows\SysWOW64\mjcmpldgomalc.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ykixbeympo.exe File created C:\Windows\SysWOW64\ykixbeympo.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mjcmpldgomalc.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File created C:\Windows\SysWOW64\vfvzmbcv.exe be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files\MeasureResolve.doc.exe vfvzmbcv.exe File opened for modification \??\c:\Program Files\MeasureResolve.doc.exe vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files\MeasureResolve.doc.exe vfvzmbcv.exe File opened for modification C:\Program Files\MeasureResolve.nal vfvzmbcv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vfvzmbcv.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vfvzmbcv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vfvzmbcv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vfvzmbcv.exe File created \??\c:\Program Files\MeasureResolve.doc.exe vfvzmbcv.exe File opened for modification \??\c:\Program Files\MeasureResolve.doc.exe vfvzmbcv.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vfvzmbcv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vfvzmbcv.exe File opened for modification C:\Program Files\MeasureResolve.nal vfvzmbcv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfvzmbcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjcmpldgomalc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfvzmbcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykixbeympo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflkunuxlmaoxwx.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ykixbeympo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ykixbeympo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ykixbeympo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ykixbeympo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ykixbeympo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ykixbeympo.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32352C0A9C2082576A3E76D5772F2CAC7C8E64D6" be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC70C15E7DBC0B8CD7C90EC9E34CF" be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ykixbeympo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ykixbeympo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ykixbeympo.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F76BB4FF1B22D0D10CD0A38A749114" be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ykixbeympo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ykixbeympo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACAFAC9F961F19284753B30819E3E99B0FA02F943690349E2BD45E709A2" be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B12C449338E853BABAD032EFD4B9" be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFCFF8D485A851C9047D72B7D91BD95E13D594A67466332D7EE" be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ykixbeympo.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2892 vfvzmbcv.exe 2892 vfvzmbcv.exe 2892 vfvzmbcv.exe 2892 vfvzmbcv.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 1668 fflkunuxlmaoxwx.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe Token: SeShutdownPrivilege 2316 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2892 vfvzmbcv.exe 2892 vfvzmbcv.exe 2892 vfvzmbcv.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1984 ykixbeympo.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 1668 fflkunuxlmaoxwx.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 2292 vfvzmbcv.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2828 mjcmpldgomalc.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 WINWORD.EXE 2640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1984 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 30 PID 2692 wrote to memory of 1984 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 30 PID 2692 wrote to memory of 1984 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 30 PID 2692 wrote to memory of 1984 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 30 PID 2692 wrote to memory of 1668 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 31 PID 2692 wrote to memory of 1668 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 31 PID 2692 wrote to memory of 1668 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 31 PID 2692 wrote to memory of 1668 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2292 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2292 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2292 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2292 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 32 PID 2692 wrote to memory of 2828 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2828 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2828 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2828 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 33 PID 1984 wrote to memory of 2892 1984 ykixbeympo.exe 34 PID 1984 wrote to memory of 2892 1984 ykixbeympo.exe 34 PID 1984 wrote to memory of 2892 1984 ykixbeympo.exe 34 PID 1984 wrote to memory of 2892 1984 ykixbeympo.exe 34 PID 2692 wrote to memory of 2640 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 35 PID 2692 wrote to memory of 2640 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 35 PID 2692 wrote to memory of 2640 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 35 PID 2692 wrote to memory of 2640 2692 be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe 35 PID 2640 wrote to memory of 2168 2640 WINWORD.EXE 38 PID 2640 wrote to memory of 2168 2640 WINWORD.EXE 38 PID 2640 wrote to memory of 2168 2640 WINWORD.EXE 38 PID 2640 wrote to memory of 2168 2640 WINWORD.EXE 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be7d9ce3b6de692964c89664b7d98dc2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\ykixbeympo.exeykixbeympo.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\vfvzmbcv.exeC:\Windows\system32\vfvzmbcv.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2892
-
-
-
C:\Windows\SysWOW64\fflkunuxlmaoxwx.exefflkunuxlmaoxwx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1668
-
-
C:\Windows\SysWOW64\vfvzmbcv.exevfvzmbcv.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2292
-
-
C:\Windows\SysWOW64\mjcmpldgomalc.exemjcmpldgomalc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2828
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2168
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2316
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD560fab15537087e3b7f697dc848ef81c7
SHA12655a70da2e6982b016dec14afb8ff4dea611475
SHA2569e5640c02c667cb1a847ccd76afffc3fd8e3690866fa6e1c2bb250465cd9c819
SHA5127dacc7b143d53670792e34475a6bd6d2f982ab3ffdf0c381231d2f5e70beb4e9f9fc479086d6c0df5070ac61316821234f229b2626091916e8e65a1300a20590
-
Filesize
512KB
MD55fd2abf0eb8d14982d6e6e1f970a08f6
SHA11a4aa179188c9bbfdff2754b78e8f0c1c4a20510
SHA25637beb945024886755d92dfc62e55f695af37eb9241dda84c0b75cfc241a39a3e
SHA512b8e8678d2ee8d6b03039a3b2b9bc95f95cc51017eb5fc083fff83c22708c2e278af9c35cf7780bb9be407e0b871b950600a6ceb7bd0fdb30b8af7ecddf136b8f
-
Filesize
512KB
MD5a89783bb579f252026c40a09f9a5fdfb
SHA1b5d0a34752e6c7693b99bf2aa86c9f647e6dd027
SHA25633326a4e73737fc0cd8726b0ff44dfed2b451fc7e794525de0555ecead7bcfdc
SHA512f15c6930009e117ad7f943c7735e983aa9f6f2eafb13b26ad21f49828fc25b123766370b862f270e6febba88fdc22b1d87830b65cdfd2055da4a566fae9f3f42
-
Filesize
512KB
MD57409d3e05f85e649eba75e099302fc8d
SHA16228c0c7dd2f1d1a922f15112ce97618b352d7c2
SHA2569e10eb6e8da421afb9c7e128f4bf51b71357dae876d364bc87cdae3a22797665
SHA5125d8150a0b64b17b35ecfbb72b3187cb0bcaebc9af3aa1c08f7011349c3a51348c97ae21a95b91878a9b70834ea507bc268cf8e66c148ee98dfc8e4d176a425c9
-
Filesize
512KB
MD5dbf1a5622ce6b8e10610cec54e3d9bb2
SHA1599b3cd65531ef1a316705a720748434f88c0712
SHA256e53c8c706260c45bbcd7358298833d89999ae513baabbab1e2108e6d7b0b482f
SHA512a0efa5f38518f608da34bd77bc4a7b1fe6506214ad4c685c54f4f6b264e153e99dcaeb09db2eb13cd9717fe18cba499942f3f58032a0e8b19303d229fb1dec5a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD50476e04d03be6d7ccfb2c4e5df1a7102
SHA1929cd62afc5c184d7cc84d7c0a4481abed1055bb
SHA256917807dc6db02b2dc7b11b8678dd789b950f7ce76bc39b456246db227ef8c851
SHA512f4bf7042247443bda7778b6e069b707894eec8a2fe5a72a8487543229fe783c5c2c3bd63d090cb819bc2b826373ede21f3a8d6592213565e901c852deec25b9f
-
Filesize
512KB
MD5087fbc0dfbfff2085b791354f9f0fa46
SHA11eb18390f933478dd09cee8b662f747705ee08c3
SHA256f9af071c21d3d074d2bd0aad5e9f09d8738cc8103313771d9969135eec872ed0
SHA5121ffb620c9d3c17fc0e9bd80539fd526f60144059d4df891d4671060cdea768dda3b7070c2538b635fdfd4d25491d8e42dbd8668515a0c1d4879b115c91608ede
-
Filesize
512KB
MD5e5fd9d57e9aa5131e73fba4a3eec4eff
SHA1294fea68468d3ca0c9f9d9b00ac176657192c2bd
SHA256c929568dfe78a07cb16daa8dae95c19459b9fb691eebf388afa677d71975e0a5
SHA51233835d31d0f60befee086c6e8070bb6d09b1b7ed88e09d5f41f9929ac176dbe6258bd34da9eceb134f7fea2382329efad5d3da248cf916c730de52ee9dbd831a