Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 20:01

General

  • Target

    d5077e9ee2b6c67379407036ceb842e9_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    d5077e9ee2b6c67379407036ceb842e9

  • SHA1

    959beddb1063c86c18cbb81c70ddf527c05dc4c2

  • SHA256

    f9f84e12379fc963416655b06293ad85ef36d2119b5ee9ead55e8de0d437c93b

  • SHA512

    787a6145b231b3c608ad46a4afbd0a2d978be2df8956f392e831efb71f03204001d9c8f3bea59e7c275f6fc492f793805ffcd3bf5d1133f307ac790813ef135d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj63:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Y

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5077e9ee2b6c67379407036ceb842e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5077e9ee2b6c67379407036ceb842e9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\bxafrmgymw.exe
      bxafrmgymw.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\aalcbcom.exe
        C:\Windows\system32\aalcbcom.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2652
    • C:\Windows\SysWOW64\pkltjflhvrhnaqh.exe
      pkltjflhvrhnaqh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2800
    • C:\Windows\SysWOW64\aalcbcom.exe
      aalcbcom.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2872
    • C:\Windows\SysWOW64\axgezaqgbkqfv.exe
      axgezaqgbkqfv.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2856
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      6db3deb1a29a46ed10d2819934c49a62

      SHA1

      90efaec094c73161e57a4cdd938503f30a5da7dc

      SHA256

      6d5ae02f51bfa777a2bb08bf1e92eb1a71c25d6eadf8c9a020d4dc5831773c66

      SHA512

      f11bdc706ae2104276fd086a54f29b1e06bd16876b6bbc84e0df812d599c85e0c483e2a96ea83f2d348ca9088e50c2f3d065c91abd4b5c8d36d9fbb42b945d28

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      3edb0b520ebd30d416b7fdcdf923afe8

      SHA1

      1ff58d76e5e52d8d8f5f993e3c09af247aabb4e3

      SHA256

      cb4c6c6fc7ef661295db2841f1518c99304885fd4c1c19cccc61fca3eea60455

      SHA512

      478e02f17be658a26276f798140bc02e1536276f548693be12f2db861ff15ac9da6db2c494c5a96d40039b05631139c0117bfe5a88449343e59650f722785272

    • C:\Windows\SysWOW64\aalcbcom.exe

      Filesize

      512KB

      MD5

      8fc01478eaab138bde4fb0eee5a3d6aa

      SHA1

      2e21220d0a66ae414b593faf58d86d7b50951e3d

      SHA256

      f6d3b0c8b4a81f2414d5a9bf626e25935f68d9d1e1af5747ab1912f8d21e4349

      SHA512

      71efb53e5c523e20e5a4e61e441a78470e40867f08842d17d8a5e92ed15b0c70e820a1f0db31fd74a25e5a0ced64bd0066e1e4433025b608badd78cd5ad938fe

    • C:\Windows\SysWOW64\axgezaqgbkqfv.exe

      Filesize

      512KB

      MD5

      270565203520f1d5a96b0b304f75dda0

      SHA1

      b0bf91884d5942bc45599842391bd53792785afd

      SHA256

      d7d267bd1618c973a72de7f3ab01715e600d288dddbb77dc2504394f0dde823a

      SHA512

      28d518ecf371a576558dc9c14e763f7a65e7907f8cbd4f804f31ed07629277af068e9c3dc2f97ec0b9e950ecaabd6a65c4547804bdea19f99bf651c2516ecf15

    • C:\Windows\SysWOW64\pkltjflhvrhnaqh.exe

      Filesize

      512KB

      MD5

      a095c3274e61a60708f7b81d8d78ba8c

      SHA1

      74bf1838032fa27bff677f09de6ff48a695d01c3

      SHA256

      2a3298e7baeefb79915a2d23adbfe21bd8e72bc5149039fb95acbe4ad7f188a0

      SHA512

      031e6105749026c4b06e4facb63dfdd6dad17e139f3aa36f3b344725df7d00548e573d7e92e475b6d4f85f69eb7848d20a6867bc624ce4bc7856dc958c1e9b8f

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\bxafrmgymw.exe

      Filesize

      512KB

      MD5

      f621e721f565b8635b4419afa35d6571

      SHA1

      6c90cbc2c9fa7b62c69248755406dc3168bde208

      SHA256

      d858638e76aa32ad93261b976b89e2e602fb358e686cbcb4f7cdff6f908f4255

      SHA512

      644b74f42871d545641c93994caeee420ce827c2cef1bf26deed7858d487123701a0709adba6aa62aee5d7f1af44bfc168526cea84973b48b5ee9e33f49527ef

    • memory/2724-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2724-92-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3044-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB