Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:54

General

  • Target

    ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ea74a30434592a4890be2e6b6945e9f3

  • SHA1

    02eaa622cc6ec787393e4c2bf4c1972932ca4f48

  • SHA256

    628aa0bc37ab01ae98277fe219cec0e3deb65c0409fbfef2edc1e5705e0593e8

  • SHA512

    05bdce325193db3f9d452aa3343f71c82d4a542425e6c0297d422d058b3348bf40f80bf9944044659e400f7072ef19bc84190a6c56f2c9f78bdfb2e03fa5aa9e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5n

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\SysWOW64\vpvcuofinp.exe
      vpvcuofinp.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\bvkipjmb.exe
        C:\Windows\system32\bvkipjmb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2728
    • C:\Windows\SysWOW64\bcuqyupstznyvcg.exe
      bcuqyupstznyvcg.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2948
    • C:\Windows\SysWOW64\bvkipjmb.exe
      bvkipjmb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2284
    • C:\Windows\SysWOW64\giunuyfersrsd.exe
      giunuyfersrsd.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2740
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      04ebc7d359c3e5d1ff28d9cfa865bf2c

      SHA1

      bc4fb263ecd4fc1f2efb12c3e017e9731c2977e1

      SHA256

      80cc6f0563f8cf18a920bd6b6b9ce722db13d24c31506989ee2b55307594c28b

      SHA512

      c0ca307f37266882f5bbc533c0fce8ba545b70f2432ba53f8c54de7dfa98d48b390472bb1205bdf49285b33029408a3a0102198ce261417c9d331b2b0cfc0cad

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      c9a087d0dc8e013d69e65bf225c7c2d9

      SHA1

      16cb3ddccae9cfc2aa392f6dc5dd433e417987f8

      SHA256

      a71847b109f5deac19616f7de93e2c22c5b8ac5b544dacfa10faca25040f6899

      SHA512

      2908afc929fb9ba21c620f677092f563e3f96b0492e63362e82719b729c82d3b5f440d55d81ce14fa3dd6507640f984971cdd17eeaeff2b968a597ce57de9832

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      e1166a085488aed1d93c31ee52d3ac42

      SHA1

      b6bbefeb5c26d40498efb9e336178e1309ceee3d

      SHA256

      c574f319315b74c2352ccda8ffb85eb0cdf161b8ca61075338263fb7bfc91f2f

      SHA512

      55be0b080be96154e76e3388938c2d7fd45528358d2f7d4aef2e19622318691bc01da94b747ee58c212d975965c658f9a3a8c3b1e05d51511ab0850b7aaf254f

    • C:\Windows\SysWOW64\bvkipjmb.exe

      Filesize

      512KB

      MD5

      e83c8e3f2a327d831017c987de203ddc

      SHA1

      254e5775823460a53846120067eb273f5c7fa351

      SHA256

      a864f126eaf128bc650b3788c04d8725bbcfa72a894e87ea314d7626441be3ee

      SHA512

      c375f12488fb5ea413a90112e2ee8556fa7a627344eddb85969fd3c36aa9ddf0f315ffc7f373334b7abebb7a01588b9eb65535a3c635c12a0afce341b73352b8

    • C:\Windows\SysWOW64\giunuyfersrsd.exe

      Filesize

      512KB

      MD5

      061e59e0056b95644f64af6588a54670

      SHA1

      633257734c9a566a52cb6269f8352d85127a79f6

      SHA256

      7ce81319b30ecffcaf4b409470fc5dd2867bea600e0e30c3ab84d3cdcbf4aefd

      SHA512

      b4a7a433955af3d91d7e10e640ac60e421aa6442e7d8d3bfc16424ea8f00229c738c2e3593a7f864c14ffe222b192957e976e92aacb02c26ab01ca9ec14bd0e6

    • C:\Windows\SysWOW64\vpvcuofinp.exe

      Filesize

      512KB

      MD5

      20361a21aea8202e70196315662dbd2f

      SHA1

      7f4874c635d767416c4b4c96e754bac6e6e41be8

      SHA256

      e3841e3f25542b5f5f9ddfca57180e76284de93d42ff15f6b9fcebabd02a9c50

      SHA512

      97b215c479ace635ec50ebd63d1a1a56fdbabd4fc9caec5ca0471ee479c4fcf67ce820564b9edd94a53035e9827ca0166889b2ef7f7c910e3568b2ffe5e5b09c

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\bcuqyupstznyvcg.exe

      Filesize

      512KB

      MD5

      0f89012d816ca4f0303810499060f2f8

      SHA1

      3b63dde66339301fa00af293c109b1c544baf242

      SHA256

      ca2b6c74fd959d6b6184c66fc8e645589ad1dc512728f52f629a101fd8d12901

      SHA512

      97b3f6c36dd2d876205d02b620228e9a6e45ee8d242be7013dd0d107623f8044d777f70edb24d0a0c1de01ce755a0ab903c2e00fb3d416c3746d63b4abeb9e06

    • memory/2516-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2892-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2892-95-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB