Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe
-
Size
512KB
-
MD5
e0db290e308d881e2cfe1d14eed9e3e4
-
SHA1
6fe61b05a9e6fc48091039b0bd19d7f2c2c0165a
-
SHA256
a3dad0d25d4d4d9b3ca9e1ff6e84cc891787b843635c24b037247fe94d4d3bb9
-
SHA512
a26b2621fecde79570666e8a26dea1fe332856b3699a166e727b604451fd5f457a2a066eb385163b67e4a17a0f07ea36ec085b4e06b47d9cd82a1354d44acac6
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6L:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5U
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" alhrtajggt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" alhrtajggt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" alhrtajggt.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" alhrtajggt.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 3404 alhrtajggt.exe 4512 ejdletcgoeoxiwb.exe 3256 fziwzixp.exe 3536 cnkagvzgzgqby.exe 872 fziwzixp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" alhrtajggt.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gfbttibc = "ejdletcgoeoxiwb.exe" ejdletcgoeoxiwb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cnkagvzgzgqby.exe" ejdletcgoeoxiwb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\chzcofab = "alhrtajggt.exe" ejdletcgoeoxiwb.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: alhrtajggt.exe File opened (read-only) \??\h: fziwzixp.exe File opened (read-only) \??\q: fziwzixp.exe File opened (read-only) \??\o: fziwzixp.exe File opened (read-only) \??\t: alhrtajggt.exe File opened (read-only) \??\t: fziwzixp.exe File opened (read-only) \??\m: fziwzixp.exe File opened (read-only) \??\u: fziwzixp.exe File opened (read-only) \??\g: alhrtajggt.exe File opened (read-only) \??\r: alhrtajggt.exe File opened (read-only) \??\e: fziwzixp.exe File opened (read-only) \??\w: fziwzixp.exe File opened (read-only) \??\q: fziwzixp.exe File opened (read-only) \??\n: fziwzixp.exe File opened (read-only) \??\p: fziwzixp.exe File opened (read-only) \??\b: alhrtajggt.exe File opened (read-only) \??\u: alhrtajggt.exe File opened (read-only) \??\k: fziwzixp.exe File opened (read-only) \??\z: fziwzixp.exe File opened (read-only) \??\i: fziwzixp.exe File opened (read-only) \??\t: fziwzixp.exe File opened (read-only) \??\a: alhrtajggt.exe File opened (read-only) \??\b: fziwzixp.exe File opened (read-only) \??\b: fziwzixp.exe File opened (read-only) \??\w: fziwzixp.exe File opened (read-only) \??\v: fziwzixp.exe File opened (read-only) \??\q: alhrtajggt.exe File opened (read-only) \??\e: fziwzixp.exe File opened (read-only) \??\j: fziwzixp.exe File opened (read-only) \??\o: fziwzixp.exe File opened (read-only) \??\r: fziwzixp.exe File opened (read-only) \??\l: fziwzixp.exe File opened (read-only) \??\m: alhrtajggt.exe File opened (read-only) \??\s: alhrtajggt.exe File opened (read-only) \??\i: fziwzixp.exe File opened (read-only) \??\m: fziwzixp.exe File opened (read-only) \??\k: fziwzixp.exe File opened (read-only) \??\h: alhrtajggt.exe File opened (read-only) \??\w: alhrtajggt.exe File opened (read-only) \??\z: alhrtajggt.exe File opened (read-only) \??\l: fziwzixp.exe File opened (read-only) \??\j: fziwzixp.exe File opened (read-only) \??\y: fziwzixp.exe File opened (read-only) \??\s: fziwzixp.exe File opened (read-only) \??\u: fziwzixp.exe File opened (read-only) \??\a: fziwzixp.exe File opened (read-only) \??\p: alhrtajggt.exe File opened (read-only) \??\g: fziwzixp.exe File opened (read-only) \??\p: fziwzixp.exe File opened (read-only) \??\h: fziwzixp.exe File opened (read-only) \??\l: alhrtajggt.exe File opened (read-only) \??\r: fziwzixp.exe File opened (read-only) \??\k: alhrtajggt.exe File opened (read-only) \??\n: alhrtajggt.exe File opened (read-only) \??\e: alhrtajggt.exe File opened (read-only) \??\a: fziwzixp.exe File opened (read-only) \??\n: fziwzixp.exe File opened (read-only) \??\s: fziwzixp.exe File opened (read-only) \??\x: fziwzixp.exe File opened (read-only) \??\x: fziwzixp.exe File opened (read-only) \??\y: fziwzixp.exe File opened (read-only) \??\i: alhrtajggt.exe File opened (read-only) \??\j: alhrtajggt.exe File opened (read-only) \??\o: alhrtajggt.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" alhrtajggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" alhrtajggt.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1396-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000700000002359f-5.dat autoit_exe behavioral2/files/0x000800000002359e-18.dat autoit_exe behavioral2/files/0x00070000000235a0-26.dat autoit_exe behavioral2/files/0x00070000000235a1-31.dat autoit_exe behavioral2/files/0x0008000000023461-77.dat autoit_exe behavioral2/files/0x00210000000235d6-582.dat autoit_exe behavioral2/files/0x00210000000235d6-587.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ejdletcgoeoxiwb.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File created C:\Windows\SysWOW64\fziwzixp.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fziwzixp.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fziwzixp.exe File created C:\Windows\SysWOW64\alhrtajggt.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File created C:\Windows\SysWOW64\ejdletcgoeoxiwb.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File created C:\Windows\SysWOW64\cnkagvzgzgqby.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cnkagvzgzgqby.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll alhrtajggt.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification C:\Windows\SysWOW64\alhrtajggt.exe e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fziwzixp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fziwzixp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fziwzixp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fziwzixp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal fziwzixp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fziwzixp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal fziwzixp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fziwzixp.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification C:\Windows\mydoc.rtf e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fziwzixp.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fziwzixp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe fziwzixp.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe fziwzixp.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe fziwzixp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fziwzixp.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe fziwzixp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejdletcgoeoxiwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fziwzixp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnkagvzgzgqby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fziwzixp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alhrtajggt.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33422C0F9C2182226D4176D170552CD97DF265DD" e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F26BC4FF6E21DBD27FD0A88A789113" e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh alhrtajggt.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B02047E7389E52C4BAA2339DD4BF" e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" alhrtajggt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFFABEF910F19583753A4586983996B08002F143670248E1BE45E708A8" e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183EC60C15E0DBBFB9C07C92EDE734CA" e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" alhrtajggt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFF89482B85699146D6217EE6BD95E641594066466345D69D" e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc alhrtajggt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" alhrtajggt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs alhrtajggt.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3968 WINWORD.EXE 3968 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 3404 alhrtajggt.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 4512 ejdletcgoeoxiwb.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3536 cnkagvzgzgqby.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 3256 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe 872 fziwzixp.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE 3968 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1396 wrote to memory of 3404 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 91 PID 1396 wrote to memory of 3404 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 91 PID 1396 wrote to memory of 3404 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 91 PID 1396 wrote to memory of 4512 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 92 PID 1396 wrote to memory of 4512 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 92 PID 1396 wrote to memory of 4512 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 92 PID 1396 wrote to memory of 3256 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 93 PID 1396 wrote to memory of 3256 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 93 PID 1396 wrote to memory of 3256 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 93 PID 1396 wrote to memory of 3536 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 94 PID 1396 wrote to memory of 3536 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 94 PID 1396 wrote to memory of 3536 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 94 PID 1396 wrote to memory of 3968 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 95 PID 1396 wrote to memory of 3968 1396 e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe 95 PID 3404 wrote to memory of 872 3404 alhrtajggt.exe 97 PID 3404 wrote to memory of 872 3404 alhrtajggt.exe 97 PID 3404 wrote to memory of 872 3404 alhrtajggt.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0db290e308d881e2cfe1d14eed9e3e4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\alhrtajggt.exealhrtajggt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\fziwzixp.exeC:\Windows\system32\fziwzixp.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:872
-
-
-
C:\Windows\SysWOW64\ejdletcgoeoxiwb.exeejdletcgoeoxiwb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4512
-
-
C:\Windows\SysWOW64\fziwzixp.exefziwzixp.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3256
-
-
C:\Windows\SysWOW64\cnkagvzgzgqby.execnkagvzgzgqby.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3536
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=3944 /prefetch:81⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5c5af79bd196078088d7e5cab052518e7
SHA1195fe43356da754178b5dd3e5eb7f7fd5aeb6fea
SHA256e64f1322c9b24096a688b9101417aa07562287a550f33d4289f31b5bbc64d755
SHA51282ad3a198a5ef621922634d5e6174800b708b416c616fcff95770d8c24b922688eba655ac6a8ed37ea5c704dd4ce85a6c6219b02cb698508aa103d8d9dc87fea
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
272B
MD5f42da57f350707641c762530091429a8
SHA15491e2b6905c817547f2d1a18a28b178c637234a
SHA256603cccda24514350e5b6044c6432a51012b1a54a0524811faef549598763b319
SHA5124e3fea097e55f3b78db67beffd368150b84e8bee696e29006968b3d1ff3f4f6a82be4ae15fae4adefc4a084483ae90801948d86493dda2bee8f42c7c4b177133
-
Filesize
18KB
MD561428b3487ffda4f389835b6f73f9db3
SHA1dee93985185f0360f5bad25987ef4ac9100c890f
SHA256b91eb32fbb90dfbcd88af0ec9738715050e13c3b3a8a1577ad69eee55682219f
SHA512f6ed8f542bff73dee92c6f2bda08a14a24db3585c7ae80bf007f4eed56c4e0d944ec762a383818dbceb20eae0cf54857095c4f1b44e577d738bec5f7e5ae915b
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize679B
MD59e7b5b65922222bc6ac20da866f28a1f
SHA14a613ad1b3b3d7559e490879b32965dd3e411ec1
SHA256f3ab52e1bc00bd8e3b30f7b6da49d21b7e1119911e5967aa89206cedf7e30247
SHA512b1e6bb765a69cdd89ae862aa19c8e7be5a40f44bf55dc2a929d1d3d55783b9e76547adc5fc425de1e6fe62fbc778a87b26923b0bb741699c8a2886633e979e99
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize24B
MD54fcb2a3ee025e4a10d21e1b154873fe2
SHA157658e2fa594b7d0b99d02e041d0f3418e58856b
SHA25690bf6baa6f968a285f88620fbf91e1f5aa3e66e2bad50fd16f37913280ad8228
SHA5124e85d48db8c0ee5c4dd4149ab01d33e4224456c3f3e3b0101544a5ca87a0d74b3ccd8c0509650008e2abed65efd1e140b1e65ae5215ab32de6f6a49c9d3ec3ff
-
Filesize
512KB
MD55de373349d23e0f2ef00af85ba57350b
SHA1ea00319da0e5b0590b5d9f74aacefa63ac9f2cf0
SHA256b97d54b7a33af50f7bdf611bb8a208ac5946f2bf8227863de6898477f5d011d9
SHA51201411ca248d99361498b94309630c9d6bb5adb94c01bcfd79c15301d5c86db88345341f7cafb93d3a39c7a4b9912fc0dcf190b352f83a0a7c146753b75b1bfa1
-
Filesize
512KB
MD506f6713000b806c037f9d717c658b1f3
SHA14cc4f94d327016c21dda5c3f1a7ce0f0cc9eebe2
SHA25647b3c64a1c470b45d27951e5852ef2328c30d51cb59e75fcbd6488f63c63948d
SHA512c601801363947e37b15f0a78e84e5d181950b46c5bf3923495509523f81f94afa116aa5968c2bbfb64509d33eda5db1f139272fe97b64d88d52ac518ad5868a3
-
Filesize
512KB
MD59699362eb8b88f03d8af7a8cf2870294
SHA1dd17785bb1ab0adadf55dac85a2e0ce8082ff826
SHA25686151384af008826abf2c27f964ea45ea8639b9d5aed0289d100c188df0fd1b0
SHA512ab4bfb0dab250895ff0d67f136a55ff62ee13164d64a9d55b8ce3dbb7dd2dd3c42fedd0399748398d4bbb1196f7e1cb6c36c834830d3e05385885c3379d0e082
-
Filesize
512KB
MD58156789a59136d0e2330f57d642efc8a
SHA1b66735dde3f6a9e2721ad4af260c175e530ee9f8
SHA25678a7e154cbf67a8295133eea138ad3efb64357626616be06a11dceac6ef89bc2
SHA512ae688caac210c40c9146a2a80a82f7034c24e66ce6094f17e68fbea4cba2c93182db8a3cb731be9c608f00f0ed0ff302c6dcc0246f4005b71365b878f17d4a10
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD51ceb87602014b5224972c3bb4f76dc1d
SHA1d480278a983b4ee12dc0e3224700ce6d65a0907c
SHA256c45de12ae37426f509b6d2db7a9f1014216ebd527032613db21f86cc62a7b0a2
SHA5126f8e2b56b6df05d9ceeb385a3f04b5656e9d910a2f073670b19c73a1220accd221b4ddd91dcd04b03cbff8346e109807978d1279b8e3571f0489e24a9980cc2c
-
Filesize
512KB
MD52e98ea7f09f986f439b4b8f8806a6826
SHA1dbf39fdda0d30ecc4756ad37d1498a34aa069232
SHA25664fba2b0fb4b67401cedcaae97c8697f4006505b2a3536b634d8262e629d2385
SHA51215a18a2f2b83fb417a28fc64a898a0d0855301e4cdd8661ab8c8f9122f8b08b847838ce5a0fcd56d49019c26a465b778dc85fa24424a9129d19bc1fd9a522385