Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 22:44

General

  • Target

    d538e33e460f736d6748f866ee31fdc6_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    d538e33e460f736d6748f866ee31fdc6

  • SHA1

    2b5cf80c58d6bc905c11f9374ecc64f962aa5b6a

  • SHA256

    7fd5992c88194526a13050960d694f1b637d8a87b9d845e9a4b0d3c47560174b

  • SHA512

    7ca6d93548f247d0cf08cca98b1dbcabfd93ecddb5dcd33ac631ae296ab03f6711a01f46800e32650321686d798210b2026ff45023424cfc369b25e84114711f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 24 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d538e33e460f736d6748f866ee31fdc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d538e33e460f736d6748f866ee31fdc6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\inbqvpmshi.exe
      inbqvpmshi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\etjorygh.exe
        C:\Windows\system32\etjorygh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2556
    • C:\Windows\SysWOW64\otkheuvhfcxibag.exe
      otkheuvhfcxibag.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2800
    • C:\Windows\SysWOW64\etjorygh.exe
      etjorygh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2684
    • C:\Windows\SysWOW64\gxbriozkrapsz.exe
      gxbriozkrapsz.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2172
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2072
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      7d880fcd2c1f03036ee0d2bea33f4e17

      SHA1

      470d9547470bb61f9b3370d0f7e0e1086b9b8587

      SHA256

      db08f527bc92c22e25664daef3fe02a94b6a362b5918d94a992030375870f603

      SHA512

      c9c38b7326604de21840560ae543445ed7d177b9a8c54827ea4dd9185ebc819398876240a83e1c36fb1973e2b11c3f0649e177c2bdb23c36c8c8dda11fb245db

    • C:\Windows\SysWOW64\etjorygh.exe

      Filesize

      512KB

      MD5

      442644d06f6c8b29c7ef3479a613c697

      SHA1

      159709bfe8633f1f549bdc05eac17a4c0d02f724

      SHA256

      8ef090f95c3148f5519aa8c631d3a856c211e6e5881abced3cdf198b01f71ff7

      SHA512

      9d22cf2d702c2fce26da16d71de550f3302382139bdd38134e60206dadaf20f37c010a1b40183d2c657ad26d890e3fefc3eae1aa0102940b8ae898f833fb394a

    • C:\Windows\SysWOW64\gxbriozkrapsz.exe

      Filesize

      512KB

      MD5

      2e24b972042cd67cc7dfda862be80253

      SHA1

      c162076bfe837f9720e35de73edd10746ddcd31f

      SHA256

      ed6ca99926d4767f94e344bce2a81b07d47ea121834cff8eb488f3c28c95885e

      SHA512

      ac8889376e0f41a58688a8fc8e28d9a845309ef19bcaf236b25f35ce0a84def66fc6e639d4dc3040dabd73e4671a7f72656bd67558d88b8dfd29cc81727896ee

    • C:\Windows\SysWOW64\otkheuvhfcxibag.exe

      Filesize

      512KB

      MD5

      22efd2b7023efb38fd1200d09c12301f

      SHA1

      d350ec41f062f9c96260a3581edfb2eaab53c3f4

      SHA256

      dfbaedb3e149a69ef36ee09b34c42afacfa89b9dd3d6716f0ee3d92f017bd44d

      SHA512

      3c05d4ed742377ad1427bcdeb891fbf4550c7731ddda3d919db1aec103e4418074795425a1e955bb6027dd3a308c2353676ac04b717afac403ad10af24508135

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\inbqvpmshi.exe

      Filesize

      512KB

      MD5

      d946b7b617951396d3f85dbb6ac1f803

      SHA1

      b9a577339456600c1a40119db3ecc5c4d16d6fde

      SHA256

      36db5f6e56035ecabb5799c4f3a90cd2f7695b8f88482b6f6ec6b24dd2746d58

      SHA512

      d6e2514e6eb82f3d63928683232ee09650f5c12f8ffd601b7816ebed340d620d7f7601ff1df32c96885f3ea75efe4a8c12910c3e2d8d49507c9b933bb027e8fa

    • memory/2180-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2612-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2888-82-0x0000000003CF0000-0x0000000003D00000-memory.dmp

      Filesize

      64KB