Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 00:39

General

  • Target

    cde469d78e0fb53505b664f337ef3da1_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    cde469d78e0fb53505b664f337ef3da1

  • SHA1

    55d26c8e6211812d4b09a44aacb09e19b9d47ff0

  • SHA256

    f78717d667afdba2592ad2c25e71018ddf900e35d2a40f556e9118a85937770c

  • SHA512

    188e8878de474fb39a816e90995a7f0af6ec3bb026937a572d3d6be2eaf4784870d995b36b16e68a07a9c9ee0d54678c6b8497eea8a2ea1ceebcff74d3480250

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 24 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cde469d78e0fb53505b664f337ef3da1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cde469d78e0fb53505b664f337ef3da1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\yzbppvwbfy.exe
      yzbppvwbfy.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Windows\SysWOW64\eacanpdp.exe
        C:\Windows\system32\eacanpdp.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2904
    • C:\Windows\SysWOW64\uykpqallraweizr.exe
      uykpqallraweizr.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:808
    • C:\Windows\SysWOW64\eacanpdp.exe
      eacanpdp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2728
    • C:\Windows\SysWOW64\uthyauxuqlawf.exe
      uthyauxuqlawf.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2804
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2396
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      d9271e9c202090e696ff6b00df622308

      SHA1

      9710086da62ac0ce91453608019dae9aef764929

      SHA256

      b9e482f4b5551bfe0aab22e60ea87faba66f1854543039f16c30f2a476e5cb3e

      SHA512

      6d9a3378230c1d5efcdd8e4afc9b879abd690ba940bbdc2afae326dfe568db6f9ad6b07cda038e08cecaa1cfcce4c04982ba49dcdb93ed98331c46f1aa7943b8

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      e92588a957f38b23ba649a5fd7caaa4c

      SHA1

      e1d181f2ad0731f054e94e40e6d03de4b1e03815

      SHA256

      cb02b8a310c0513849957219f0642d71894dea4a40b43c97ad853ddd6cd0fff9

      SHA512

      61261344e57407a672ab950b830066a7690192fc30ce8655c043d5ad83af045daf8e5557b64bd75338f81cd750cacd656e7b9e3fbb16003dce8df623c72f482a

    • C:\Users\Admin\Documents\DisableUninstall.doc.exe

      Filesize

      512KB

      MD5

      9db4b71a10439f6b13ed11620620a4ad

      SHA1

      7a0e03a5b47de1dbc6a350147890370c18da9fe0

      SHA256

      523c61f8e692809041f4e42031234ca0c21ecf094b1e425107bbad2fafc6ddf7

      SHA512

      28cabf4ca8317b204d7e8c8304e08fc64a6fff853596fa602fa89ccc9d4fcf6ed7a1fef605788269e66719fc827452811bc8c0d927835609c883037e29e11632

    • C:\Users\Admin\Documents\WaitSplit.doc.exe

      Filesize

      512KB

      MD5

      537a95e58f03be357e7faf151eec14a5

      SHA1

      9087423c77cf2deeec3561b6fa392902af81ad92

      SHA256

      6c167056c4aa6ced859d76394a7da13b3e3c575e6f19952dc3260ea7144b1239

      SHA512

      d18c478bed28afdf7a0e878811c2447c9d229d77cdd2a799c6e1d12bbb85a0e3dc8908304e9c947c8f95f3eb9d8c3cca1fbeb0f1284e070aba2c3faed719d668

    • C:\Windows\SysWOW64\uykpqallraweizr.exe

      Filesize

      512KB

      MD5

      95a055623b56099bfa3421c2f5a04f27

      SHA1

      5b675b65d6d5d0bc7db1e26680a155f479cd5eac

      SHA256

      e5d323ce55e754880cf6d7699f9aac0436637d3b1fd488410c3ebdbce7b6092f

      SHA512

      eca478cc6c74ccb95c5ea8502c2991b42f3830f2d5740c22e485a16abb7d9ee296cf0bfebfe2073c3e4cefde9643e1b8c62ed8f3e61881d2e2d6a556bf55d030

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\eacanpdp.exe

      Filesize

      512KB

      MD5

      1eed8bdd3ff37f71997cb7bb78de395c

      SHA1

      d2e03d9a4c7e62df54eba1e01caf98a9afa544ea

      SHA256

      202a56188986e61cfef0a61bc77e962093df72c8c611f8a359d25b9df77f0693

      SHA512

      f990f3e62f19c5c01993fd75dade47744ee132e920a3de913efe7997683c941f512985e7745363ba864b1f7b24f26f65a281dec67d0f2546754378a4de810835

    • \Windows\SysWOW64\uthyauxuqlawf.exe

      Filesize

      512KB

      MD5

      e5558244a9bee27d32be731755ebfe78

      SHA1

      92c85e745618080905adb8d77b6301e8b970d13f

      SHA256

      b3a74e8bdccf1ee892119c530d555e669c0497447c7dab9719d52e9802dd24f6

      SHA512

      0b8d8a67cb6c2a7088b556964b4e5edabd554482498d1984a1934d0c496873b6b2cf3f172a3b8e6c87f60a294ba7fb7e13ba4e1b1afeaa8897bb479d09a889b4

    • \Windows\SysWOW64\yzbppvwbfy.exe

      Filesize

      512KB

      MD5

      147080e3b397963eef40605e36f5fc98

      SHA1

      d6baa96ddf4abbe53bdec3ea1a791dd1e9e267b0

      SHA256

      244693bc8437719df58a4b2ada98f5bb1e5ac456d97b6084c204c5c35b5f323e

      SHA512

      7a689f4fdce938f5bd771f732c6d5bb7d026cdcc6305dd63969595d2429cc43e0011f2c5ac1d9a9b00822377ff1bb8bb044e670f88a6c0df1e6d33fc402570a1

    • memory/1540-98-0x0000000003D70000-0x0000000003D80000-memory.dmp

      Filesize

      64KB

    • memory/1648-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2916-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB