Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 15:59

General

  • Target

    dc9063b98ddc0372cc6aabe10d00c379_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    dc9063b98ddc0372cc6aabe10d00c379

  • SHA1

    10bc51c8e9c32f6e07d45676c873961e3acb9495

  • SHA256

    569b9bc09c033c0233bab251d651cd8ebfc6b294c6250862e6afa9dd57a9d7d4

  • SHA512

    4b506c2607505fa2572a90b2888e2992cdfaed52e1edeea7eba743033432cf05b78fd035114d97e9518df2de28ebf84e321db51229934b7e770f56db6c7a05d4

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5/

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc9063b98ddc0372cc6aabe10d00c379_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc9063b98ddc0372cc6aabe10d00c379_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\ypzwhlejop.exe
      ypzwhlejop.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\ddeprebf.exe
        C:\Windows\system32\ddeprebf.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3348
    • C:\Windows\SysWOW64\qnnkiazckypnmwe.exe
      qnnkiazckypnmwe.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4204
    • C:\Windows\SysWOW64\ddeprebf.exe
      ddeprebf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3844
    • C:\Windows\SysWOW64\jfuyutgcovthg.exe
      jfuyutgcovthg.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4612
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:884
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4508,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:8
    1⤵
      PID:4588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      e5fcb477ebfba3ef10fb7e74a755f00c

      SHA1

      420ac4f6d8b13d66882c450919119774af0dd62a

      SHA256

      1ec8b794912d924eaa9ddc8537d31ec672bb742268b689dbb4469c8053488e2c

      SHA512

      f9470eef1ccfbfd022406ccac0720af4572166e4a0b1463c41260f3fad9652400197718902253c0d777d8e799dcc7c2f4e8f148bcb0f6ab992697c7174926741

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      02325b53ab190d1b8daa2e9fd1e40544

      SHA1

      972c5b8abfdf09e10823e4a41fb670c0e3e8ee13

      SHA256

      b6d565598f43be1a3dba87c5a62a4a6305b7021075c2c6c5f5a3ec6b7b1862e9

      SHA512

      c5e07f6b503ac2f39ec9787375c2f24ebedda0740c7d6cdefae4fb79f338946e1ccf078b31db3858c36d78e3abf066c14e1a132dfe0e64774ad06ed53ffa2df7

    • C:\Users\Admin\AppData\Local\Temp\TCDA69B.tmp\sist02.xsl

      Filesize

      245KB

      MD5

      f883b260a8d67082ea895c14bf56dd56

      SHA1

      7954565c1f243d46ad3b1e2f1baf3281451fc14b

      SHA256

      ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

      SHA512

      d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      379B

      MD5

      feeaa9629e0836f80e00068fbf753ca0

      SHA1

      654d7966886f603359c1f64db2f87a16ea6214ad

      SHA256

      888905e9263d45f858ee7806126758ab53f145be2f19b5b3b798ddd13a3ebf02

      SHA512

      1d40b3fd9d390a7494f4473ede36b6a865655d3cf0d349da524ed5d01f88f4606b10c9ef451064d5e5bdb870b9ff456019bfbf47c8d8551534f91746081a697f

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      16B

      MD5

      d29962abc88624befc0135579ae485ec

      SHA1

      e40a6458296ec6a2427bcb280572d023a9862b31

      SHA256

      a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

      SHA512

      4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      2KB

      MD5

      28e95c0f068e6ff795297b686a057f79

      SHA1

      31abf63b6127c55fad7e5a316e4ca9eb42289d08

      SHA256

      f1bbaac0856a1b84088555fa7cd09b2f1452ffa4f7e84c36aeaadfec7a9b181d

      SHA512

      0f53a3d0ad45c774d214ffd81a6ba5d047c275bb4898b8b638f5e99f8387cd099fb4d2d5df6a0f2d50dc581a127224224e14f7e3d9353ce0dfcbfc7f67193870

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      1KB

      MD5

      e6d96a85788a281972a3842f1e935694

      SHA1

      58578a74c8574320f85e75ef30b986af858c299c

      SHA256

      f367f0d873a3be7c2c6ae8c7d51e481e81582644d32a5b93c44f95f30c1546a9

      SHA512

      f485d1d088b29aadf5363c2c9c669c1a9aeb7f348cb6363084ea9fc3be329db0a8c24dacc21f1058421f944a32f8456c6bc73edcba8f1be045589bb1251c0152

    • C:\Users\Admin\Documents\OutSync.doc.exe

      Filesize

      512KB

      MD5

      dc5453995520715443e02def901d1461

      SHA1

      c8655e053b559a7d892105a95e288bdc7d4876e3

      SHA256

      a0e86053402c61f032d8f30207ce60ed73f426574cf0caa19b866e67982032c9

      SHA512

      30753da9040eeef47e33be3bf449eac3ec4e2fa2b53d5012fd9f9af1d8b69289caa802ddd0b337c3011fc85be1a9c2737cf2ceb4a1d715d83bdd282828337f1f

    • C:\Windows\SysWOW64\ddeprebf.exe

      Filesize

      512KB

      MD5

      47aafe80ed9dd6094da691fcb35d2396

      SHA1

      5a592b4c698908082159380d7f7d5c7ea4a2671a

      SHA256

      68f1b5698a779e804e252a78b267477b93459eeb6bd9eea5709ca9e50be4d1d2

      SHA512

      4dd7b92e636eadb57950ad813f9575f348b2697b72a45ce401164cea9aec735fe870eb985c3b60d2e406486a8a701b8160789ca2d05eb1897f55897f0f125470

    • C:\Windows\SysWOW64\jfuyutgcovthg.exe

      Filesize

      512KB

      MD5

      7f242f2196680a765a39506197346f63

      SHA1

      2d407b527c44391bc5d5f109485be0cd3eeb144f

      SHA256

      b1da9c03bc237270570d2e90e84c251111f26729ac3945a68e1eb4a256aac708

      SHA512

      bdd5086f3c1ba917ebf798314f5d86e5b3552ed3f4d7717746e6a28dd8646f0bd8b3bfa5aae5f06fed6c324ad404ad5c628d98a8adf2831ea56aed2a7ba2591c

    • C:\Windows\SysWOW64\qnnkiazckypnmwe.exe

      Filesize

      512KB

      MD5

      0dc4826653b68f6e1c339ab997fe419d

      SHA1

      5d458c2d37fc655d321b83021156315404905ce0

      SHA256

      56e711d1f58f3191e304d2d97ce03744244f5131732996d0990688d79e72b959

      SHA512

      f6d55f8a333bdd8a097b763306170cc382e73f7026d512817a69533216b4f9455d50bbe94a304caf8d5e7b573867be7aee931e96a96de05577117370d08dd596

    • C:\Windows\SysWOW64\ypzwhlejop.exe

      Filesize

      512KB

      MD5

      b3bb2054b403ff47b4012b4c76c8066c

      SHA1

      27c94dce1a2213804dcbd19c051cd2fb2a3fc632

      SHA256

      06ce473de7000fa45a0017fc6c0fc64f5e6e4825c3ee5469e37d970b857cfccc

      SHA512

      7a833ae249cf0a825dfc93b58bc43881d14ecbb1117088d1b28392d3c971f4d2560faf6077b14e0fa87dd1fd6d9577e062c966611b85f9fa2658990b0e3a57a9

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      764e3634e2e5dfe6b624b0c162360f4f

      SHA1

      31b83a72a25e0c2d8f5b273e9e511a359484c012

      SHA256

      f7b2d85724a9b53d0ae45105dcdaa8eb078b5cf745d793f0e65b2e42aa6c63a6

      SHA512

      daf9139a7fa724bfefcd895f3221b785197e477f0fb2c854baa5aad34c37b1e72ea5297ac3a3b189f3e77e70caeac30957dd30b10c73b1747e45ad148b2c613a

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      a7ffddcd45f785b014d417e731e8e759

      SHA1

      ab2f5869175b95da88ad8d4bf3abdd7ba44f8224

      SHA256

      d2091c224a12eace1bf17870dc86fe6ad935989bcab18023b890a1a72e7e2e00

      SHA512

      dd7a01bdf8460878f1a9ec6c5ab149e1c47f0ec13fa696bdf883d6af4fe71f003d56bdb6fcf1f44e7c9b5ba27611f8c9c13a7ad805f08959484f47c3d93fd06f

    • memory/884-39-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-38-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-37-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-36-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-40-0x00007FF943490000-0x00007FF9434A0000-memory.dmp

      Filesize

      64KB

    • memory/884-35-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-43-0x00007FF943490000-0x00007FF9434A0000-memory.dmp

      Filesize

      64KB

    • memory/884-352-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-353-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-355-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/884-354-0x00007FF945C50000-0x00007FF945C60000-memory.dmp

      Filesize

      64KB

    • memory/2604-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB