Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 00:39

General

  • Target

    cde469d78e0fb53505b664f337ef3da1_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    cde469d78e0fb53505b664f337ef3da1

  • SHA1

    55d26c8e6211812d4b09a44aacb09e19b9d47ff0

  • SHA256

    f78717d667afdba2592ad2c25e71018ddf900e35d2a40f556e9118a85937770c

  • SHA512

    188e8878de474fb39a816e90995a7f0af6ec3bb026937a572d3d6be2eaf4784870d995b36b16e68a07a9c9ee0d54678c6b8497eea8a2ea1ceebcff74d3480250

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cde469d78e0fb53505b664f337ef3da1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cde469d78e0fb53505b664f337ef3da1_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SysWOW64\yzbppvwbfy.exe
      yzbppvwbfy.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Windows\SysWOW64\eacanpdp.exe
        C:\Windows\system32\eacanpdp.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1052
    • C:\Windows\SysWOW64\uykpqallraweizr.exe
      uykpqallraweizr.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3472
    • C:\Windows\SysWOW64\eacanpdp.exe
      eacanpdp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:264
    • C:\Windows\SysWOW64\uthyauxuqlawf.exe
      uthyauxuqlawf.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1316
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    3099cb2a85c12904da45b1863b568272

    SHA1

    db32528b1c2b83530c50d7dd0ba9e231f62d56c2

    SHA256

    77a5057f0cac740d264a7a07d6bb68e3eb8f287e9339f7edcbfcf52ddbb9b336

    SHA512

    28829e542693b2131aca41430cb2268c602e287e1a343d4207bc3db19324e9f88213cbd204627662b37508125be05a1c2aa0423e77fcec88f0b16d3232efedb3

  • C:\Users\Admin\AppData\Local\Temp\TCDDD5C.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    337B

    MD5

    e3a8122df01b6286084467da799536cb

    SHA1

    13f1cd83ce52247ba0e7a09796e6209c8aa1d4d6

    SHA256

    968f008ab974338c26ae030707d72fad8b5ec0f867551152bd9e59d11a91230b

    SHA512

    5945933be3729c19cf5688b01dc13ccad0bf6c8966e60089909c044e953dc471e5f0fe52d04ffc79ba6e5bb5e8d415b4df274b1ea801bcab984ab7f5af148c3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    153aad456c010ef74f0c58578b62b74d

    SHA1

    c5a5b356f61f56b1dffc98ec171ec9099f455ef5

    SHA256

    3f082879c2bcdefea8c457942a13e71de6859aebe465709b28489f8aad385756

    SHA512

    158064f86c95b1fa468922052c1892e28936b026c34fbd6ab3421bc8e49bc5ec935358261de53fafa0dc31030e9c58340069e975417261beb20fe19ac65d5888

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    49a7c0f2a0b1bffcb25111ec3005b675

    SHA1

    99a5f3136319f3aff0da52c084c1189240733f87

    SHA256

    38bcc01d7e6c6fcdd0a92aaa355f3dc6f808609b9cac6c5520613c8d505f1f0a

    SHA512

    360927ee86d67b3dc6b97121fe01fcefbafb04be9360d90380cc339348d476bb371aefb069bcf6bf178ecf544e18c0a2d50c944fc747d5ca95b17e0f1b1507b6

  • C:\Windows\SysWOW64\eacanpdp.exe

    Filesize

    512KB

    MD5

    b3179b725d220ea3616383268fc69fd4

    SHA1

    8e804e8fa2c874e848c1e94b3d6d8774758083c7

    SHA256

    2c1c97f46845f5066e5691cf2cef977344dd23d3283d8a2f3aa0b59f65c7bc1d

    SHA512

    0e8350333f61d224c9d0fc29786c7eaaeff2165bfc0f0c63800598b205abcab288c8efe19cddbdbd51b7a3943aeb2e991fcfc14ae4ac75c877c2fc133dee0d6a

  • C:\Windows\SysWOW64\uthyauxuqlawf.exe

    Filesize

    512KB

    MD5

    e0f2ee3e7c34814745ab1c6009aa0a32

    SHA1

    82496cdeaa0864acdaaf02c2cef4bd3d469b554c

    SHA256

    b7444599b0990736ab39c627bdc5622f1656bf80fe9bf35c115dee836ec63624

    SHA512

    f80587037c0a8c4d8da2993e2d1275e1c57c5b79c6209a7e48ab4dab229068f5b9dce69ba34a4abf4f09590a7460b39f9c147e4142d011a6fb067eb2698b0624

  • C:\Windows\SysWOW64\uykpqallraweizr.exe

    Filesize

    512KB

    MD5

    33dc18be7fe743c29201a2f1f7676f46

    SHA1

    29b4d5f1fc78f311bdc11412760bb8713669424f

    SHA256

    5b2cc96c7f74983b57a72d82fd647123b10e1402f0c7b5a25b2abf7503590983

    SHA512

    3ca719887ce381dbf37ad2c9edfdbf877245afe34d58d14a7d4baa9b6289fcff484f24ff72655ad849644af4fcaf01ab41727daeaf3c8fe14a87bdbe566fb341

  • C:\Windows\SysWOW64\yzbppvwbfy.exe

    Filesize

    512KB

    MD5

    3529e70a95ac71f124f4c4d92266a89f

    SHA1

    c597af5366c0d652ed799cd24350b3b963e2dd70

    SHA256

    1cb9de4880009035635a0c20ad08d481adc8bc68eef20923ee8acdb31d1ce336

    SHA512

    f17f74e5e4c565b9766d7d65edbb816f0d5a5593cc0ffd4634032ca615e8ebab156fa772f7919b018a99f083009b4e2932aaacc17f6c11d38731ea3397791f97

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    131329131156a412ec2c9bf87e05534e

    SHA1

    489662c2875dcab4e128647d58b4e68fe8f5e8d0

    SHA256

    0af410353ba5cfa1a9cf093eb89f01c897eed7f53c085c24a6e998bd45c44e1f

    SHA512

    6bfda65b50560c1741f88ddc3799a1eb65d0ae0e07191db757de938970ad43c7ec6187c630339c5cd31cfccf7afb3a430b3426062388356525c4ffcd7746b3b2

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    cd8631ee17d4f97b6edc2ced2ba12710

    SHA1

    57aedade5555f386e0b1b644eef176cfa2198ae0

    SHA256

    5d5114b29907135151b9d35bdbe5410e59f90dc557823aff92ae141a72233b9f

    SHA512

    8766f99eea52a5b66eec628fef16b351efe63d5a668d965929732e83b26ca83ae0ce4b4f666a019355ba2818d20861503fb6f3b21094fca240b3f774f57df19f

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    ca67e7596b3e07c91646a43e829fa64f

    SHA1

    687251b7a099ad22626c77bb1b29f39443b4afe8

    SHA256

    382fbf285f90fd8bae81933dc070437f22380cc2ddbfe68a38899852ee706445

    SHA512

    739f4d5fcec5154d76755e4632252ab9232d9f5d3a804b9ddc06c4c740780e36ca69baf474077de029e323e8e7bbb41618544011a5d2caf4b36388dd6a5cf0b8

  • memory/2688-43-0x00007FFA60E00000-0x00007FFA60E10000-memory.dmp

    Filesize

    64KB

  • memory/2688-42-0x00007FFA60E00000-0x00007FFA60E10000-memory.dmp

    Filesize

    64KB

  • memory/2688-39-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-38-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-37-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-36-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-35-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-349-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-350-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-351-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/2688-352-0x00007FFA632B0000-0x00007FFA632C0000-memory.dmp

    Filesize

    64KB

  • memory/4620-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB