Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe
-
Size
512KB
-
MD5
d2495cfe469d93db08494f27bc2fd2a0
-
SHA1
4ef854f4915e710d38fd83cede44db84c8092278
-
SHA256
d32d1aa25e20f7eb05033b56f67ddc9c5645b287a4a30876e2a4aad1a3bc0ddb
-
SHA512
c4be5918bd42dcd735bdcd72ad68eb7b8145c683e376def1a19d147704cf408e09dd1cd5715d5035dfd0ea95cb0e59987b388e4913f04c4bf8d9cd7b2415ba7a
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6E:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" zmolvforvd.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zmolvforvd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" zmolvforvd.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zmolvforvd.exe -
Executes dropped EXE 5 IoCs
pid Process 2428 zmolvforvd.exe 2492 vhjukulljybyqlh.exe 3004 kvcsrjmf.exe 2652 axgqmbnqajtio.exe 2676 kvcsrjmf.exe -
Loads dropped DLL 5 IoCs
pid Process 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2428 zmolvforvd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" zmolvforvd.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qwhiqpxf = "zmolvforvd.exe" vhjukulljybyqlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hessdyny = "vhjukulljybyqlh.exe" vhjukulljybyqlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "axgqmbnqajtio.exe" vhjukulljybyqlh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: kvcsrjmf.exe File opened (read-only) \??\i: kvcsrjmf.exe File opened (read-only) \??\l: kvcsrjmf.exe File opened (read-only) \??\n: kvcsrjmf.exe File opened (read-only) \??\a: zmolvforvd.exe File opened (read-only) \??\n: kvcsrjmf.exe File opened (read-only) \??\i: kvcsrjmf.exe File opened (read-only) \??\j: kvcsrjmf.exe File opened (read-only) \??\e: zmolvforvd.exe File opened (read-only) \??\u: zmolvforvd.exe File opened (read-only) \??\m: kvcsrjmf.exe File opened (read-only) \??\q: kvcsrjmf.exe File opened (read-only) \??\i: zmolvforvd.exe File opened (read-only) \??\w: kvcsrjmf.exe File opened (read-only) \??\h: kvcsrjmf.exe File opened (read-only) \??\p: kvcsrjmf.exe File opened (read-only) \??\y: kvcsrjmf.exe File opened (read-only) \??\z: kvcsrjmf.exe File opened (read-only) \??\h: kvcsrjmf.exe File opened (read-only) \??\b: zmolvforvd.exe File opened (read-only) \??\e: kvcsrjmf.exe File opened (read-only) \??\p: kvcsrjmf.exe File opened (read-only) \??\x: kvcsrjmf.exe File opened (read-only) \??\j: zmolvforvd.exe File opened (read-only) \??\a: kvcsrjmf.exe File opened (read-only) \??\e: kvcsrjmf.exe File opened (read-only) \??\j: kvcsrjmf.exe File opened (read-only) \??\p: zmolvforvd.exe File opened (read-only) \??\v: zmolvforvd.exe File opened (read-only) \??\l: kvcsrjmf.exe File opened (read-only) \??\r: kvcsrjmf.exe File opened (read-only) \??\z: kvcsrjmf.exe File opened (read-only) \??\m: zmolvforvd.exe File opened (read-only) \??\q: zmolvforvd.exe File opened (read-only) \??\t: zmolvforvd.exe File opened (read-only) \??\z: zmolvforvd.exe File opened (read-only) \??\a: kvcsrjmf.exe File opened (read-only) \??\s: zmolvforvd.exe File opened (read-only) \??\w: zmolvforvd.exe File opened (read-only) \??\m: kvcsrjmf.exe File opened (read-only) \??\t: kvcsrjmf.exe File opened (read-only) \??\s: kvcsrjmf.exe File opened (read-only) \??\u: kvcsrjmf.exe File opened (read-only) \??\y: kvcsrjmf.exe File opened (read-only) \??\r: kvcsrjmf.exe File opened (read-only) \??\u: kvcsrjmf.exe File opened (read-only) \??\v: kvcsrjmf.exe File opened (read-only) \??\s: kvcsrjmf.exe File opened (read-only) \??\g: zmolvforvd.exe File opened (read-only) \??\h: zmolvforvd.exe File opened (read-only) \??\k: zmolvforvd.exe File opened (read-only) \??\l: zmolvforvd.exe File opened (read-only) \??\g: kvcsrjmf.exe File opened (read-only) \??\t: kvcsrjmf.exe File opened (read-only) \??\g: kvcsrjmf.exe File opened (read-only) \??\n: zmolvforvd.exe File opened (read-only) \??\k: kvcsrjmf.exe File opened (read-only) \??\q: kvcsrjmf.exe File opened (read-only) \??\b: kvcsrjmf.exe File opened (read-only) \??\o: zmolvforvd.exe File opened (read-only) \??\y: zmolvforvd.exe File opened (read-only) \??\v: kvcsrjmf.exe File opened (read-only) \??\x: kvcsrjmf.exe File opened (read-only) \??\o: kvcsrjmf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" zmolvforvd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" zmolvforvd.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2092-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0008000000016644-5.dat autoit_exe behavioral1/files/0x00080000000120f9-17.dat autoit_exe behavioral1/files/0x000800000001686c-28.dat autoit_exe behavioral1/files/0x0008000000016ab9-33.dat autoit_exe behavioral1/files/0x0002000000003d27-68.dat autoit_exe behavioral1/files/0x0002000000003d26-59.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\vhjukulljybyqlh.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vhjukulljybyqlh.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\kvcsrjmf.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kvcsrjmf.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\axgqmbnqajtio.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\axgqmbnqajtio.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll zmolvforvd.exe File created C:\Windows\SysWOW64\zmolvforvd.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zmolvforvd.exe d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kvcsrjmf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal kvcsrjmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal kvcsrjmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kvcsrjmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal kvcsrjmf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kvcsrjmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kvcsrjmf.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvcsrjmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmolvforvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhjukulljybyqlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvcsrjmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axgqmbnqajtio.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FC8F482782699135D75A7DE2BC97E133593666436337D79B" d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat zmolvforvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs zmolvforvd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" zmolvforvd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zmolvforvd.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32302C0C9C2683536D4376D670522DDC7CF164DD" d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zmolvforvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh zmolvforvd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" zmolvforvd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" zmolvforvd.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCAFABCF967F2E5837B3A44869739E4B0FC03FD4311024BE2CF42EC08A2" d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC0B02C4794389A52CCBAA73298D7B9" d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1848C67414E1DBC3B8C07F92ED9037B9" d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf zmolvforvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg zmolvforvd.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F068B2FE6C21D1D108D1D58B0E9117" d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc zmolvforvd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" zmolvforvd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2764 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 2492 vhjukulljybyqlh.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2492 vhjukulljybyqlh.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe Token: SeShutdownPrivilege 2468 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2428 zmolvforvd.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 2492 vhjukulljybyqlh.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 3004 kvcsrjmf.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2652 axgqmbnqajtio.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2676 kvcsrjmf.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe 2468 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 WINWORD.EXE 2764 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2428 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2428 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2428 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2428 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2492 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2492 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2492 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2492 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 31 PID 2092 wrote to memory of 3004 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 32 PID 2092 wrote to memory of 3004 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 32 PID 2092 wrote to memory of 3004 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 32 PID 2092 wrote to memory of 3004 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 32 PID 2092 wrote to memory of 2652 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 33 PID 2092 wrote to memory of 2652 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 33 PID 2092 wrote to memory of 2652 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 33 PID 2092 wrote to memory of 2652 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 33 PID 2428 wrote to memory of 2676 2428 zmolvforvd.exe 34 PID 2428 wrote to memory of 2676 2428 zmolvforvd.exe 34 PID 2428 wrote to memory of 2676 2428 zmolvforvd.exe 34 PID 2428 wrote to memory of 2676 2428 zmolvforvd.exe 34 PID 2092 wrote to memory of 2764 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 36 PID 2092 wrote to memory of 2764 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 36 PID 2092 wrote to memory of 2764 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 36 PID 2092 wrote to memory of 2764 2092 d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe 36 PID 2764 wrote to memory of 1576 2764 WINWORD.EXE 39 PID 2764 wrote to memory of 1576 2764 WINWORD.EXE 39 PID 2764 wrote to memory of 1576 2764 WINWORD.EXE 39 PID 2764 wrote to memory of 1576 2764 WINWORD.EXE 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2495cfe469d93db08494f27bc2fd2a0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\zmolvforvd.exezmolvforvd.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\kvcsrjmf.exeC:\Windows\system32\kvcsrjmf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2676
-
-
-
C:\Windows\SysWOW64\vhjukulljybyqlh.exevhjukulljybyqlh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2492
-
-
C:\Windows\SysWOW64\kvcsrjmf.exekvcsrjmf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3004
-
-
C:\Windows\SysWOW64\axgqmbnqajtio.exeaxgqmbnqajtio.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1576
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5e16326ce422ca0be26a2eee6e01324ea
SHA14572b61c7fe11b9b8be0134d0318a771942b9bee
SHA256c32918e7d42524f92031db4078a2e1072e10621567a33b5bd2ef5919e219c065
SHA5125244f39cd28cc60e9cebceb8d3126b132b34e6b4a4bef4b456c152cc9dfabf16d4968a7203fd3d234258ad37e3e6d66478b6a3e75eebc574853e99668dd49fb0
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD56e73abfe9246f02c6438dc7c371a6360
SHA14ccb396f03a2d58b55a926843f46321408845d46
SHA25602cfc6f382409717f84f14df8158f4bdba808dfc465c2eca52f83e45b9e3322b
SHA5121d620fedea6b117c423fbada750935e13336074b315427acf47b92b913dc3c1b00b733cd9191e06ea5b658da22770c0b0eb95d8dc124c8604c32c20ecaa88666
-
Filesize
512KB
MD511bb3b4588b7e225a632812b62a79927
SHA1fd1193fc93eba7908583e517630cef3906d35e56
SHA25664809681d1f6a0eb3ae86c30f9a0b9b653349d64d8b9a4b2c2f25c82e9ed59cf
SHA5123863cd7fbadb5446ad4c86713388970b7d21c15f2261b0945b898f644999efdaa86a951837611aa0b2cd8c02e053d42ce489562201ee1fea1422c7d0dc27b83d
-
Filesize
512KB
MD517458516e16361b610e1b9f79ea8ca8c
SHA152dacd80e441aef9999a93645719ebb6faf8c136
SHA256e78816e35c8901bd6fd3470eddb22cb7a0410a5dd5df75ccbd74df0120cc5572
SHA512cea8fb2213e5b5c1b53cb74122876047b0df457b013ed807c45ffc75d51d2cad63c4d4707216f815db2cfb836ccced3ddbf0d5cdc401ff8472ce5dea6e8836c4
-
Filesize
512KB
MD51564609625d8939bb0ef7e9ed43fb5e3
SHA11bc886d4f843b3280ab659afd041351554f05c5f
SHA256768874ebe2cad1de60e7559b9545235670eda0ff4f1ad2272f3f0b511073735d
SHA512ffd5559d7e8b4d364215c2728ea3008053801894ca1281bfcf9ca28c3f914533bf9894ce017b7c2e238a6be895c5a5d9f3c19a56ec6a2bacf7d3e1f6bc70a28e
-
Filesize
512KB
MD5f29a0a74948786c19c9686d6547593de
SHA1f81ca33b7fb04eccf8fc28dd072212a1db342469
SHA2567f1cd46489d9450065768b6fba1fcb34286f6fc6ebad3c9e54d111e70f6f7ab0
SHA512340e8c83e99a4146cf947b1e375a3b8c5bd5862c1b79da83a129d763bc3a3a1cafe15ae813e1c90a094ce9dd74bc84a7e9ef7265805e6597cc3a3a9088fc9c0b