Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:54

General

  • Target

    ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ea74a30434592a4890be2e6b6945e9f3

  • SHA1

    02eaa622cc6ec787393e4c2bf4c1972932ca4f48

  • SHA256

    628aa0bc37ab01ae98277fe219cec0e3deb65c0409fbfef2edc1e5705e0593e8

  • SHA512

    05bdce325193db3f9d452aa3343f71c82d4a542425e6c0297d422d058b3348bf40f80bf9944044659e400f7072ef19bc84190a6c56f2c9f78bdfb2e03fa5aa9e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5n

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Windows\SysWOW64\ezomkgoous.exe
      ezomkgoous.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\llzpcqqq.exe
        C:\Windows\system32\llzpcqqq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:740
    • C:\Windows\SysWOW64\qwuygooyylpiqjf.exe
      qwuygooyylpiqjf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1488
    • C:\Windows\SysWOW64\llzpcqqq.exe
      llzpcqqq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4024
    • C:\Windows\SysWOW64\aeoxbrpokhoof.exe
      aeoxbrpokhoof.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4832
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    6bb47aaadd794384e854732c2ecbc8ab

    SHA1

    68b6fa5cb337dce5916b6396da2221f378b572ef

    SHA256

    888b57dd1f9d3190b47f40b766d3b14fd68d5248f0d62ade483c1f93aa13f243

    SHA512

    0b8e44a14129ba52c53f3aa12f4a98a6cf8ad01128eac621d1f99c97dd31e4e73cff0e7ab8e5adfe014a654d5e10022186d1c0aa1436bfb8cde48f7b84320968

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    0383aab1056e730ac19bbfafb8ab5914

    SHA1

    551db3ff626444e2fccefe2903a27f480c0ccc89

    SHA256

    6ac1841633253c32bb9b7a3d6e45a6de9f3f0c1dd1e936cc2821f86fd013ee78

    SHA512

    fd9eb702e7b97773c80035d515bd57dc37d6606f07eb7a0940f407d229a74e58e67d6536cd24fea9758db2782715520b959f19af7081651ccba61240833ed040

  • C:\Users\Admin\AppData\Local\Temp\TCD6124.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    311B

    MD5

    b9feef4c812a60e2c6f11d7938bc88ce

    SHA1

    6a662e689a87947dc9f5a9efee09c0ca4abd205c

    SHA256

    82f7ccaa70f870b91fa4b14956bdeca4c4510432ec670ed741e960fc223fc852

    SHA512

    01cea936ff6620d8d6ad3d5e38538b7555d90168ce1e959b0cc279b7a219e0a23c39169d379a6df0ffe2eab88ec9d760504f99db2f1250a8b7214025933ced4b

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    12bfa35af543bfb879daf93be759f0f0

    SHA1

    161f03179d5d178b3797c3bac2c55226fe4b0c87

    SHA256

    c22814a7cf821e8c0d4f774fb111f5a9ad185374f174bc7ea7615f896c0e7934

    SHA512

    241f88faa30b50c27f5b501924d5961b669ba0156446f6a4030429720eda11e8022854b38f46a8bc949242d447d679fe2b8a4edb4b07974afaaa420203c33949

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    7ef2d1b11b513abd92ce6c383df3dff6

    SHA1

    0bbaa633a1fabfd37e5a7a5289e38cae22e06353

    SHA256

    a2de72f71800f566e4c5659649f087cadc8842e8e30256f694d76368f196ef3a

    SHA512

    e0f41006486920c04eda8b9a43f888ecd301bf951736c80e80c226126fe026384cd6eb9f530da280075f682e907aa9e97a8dbea6b4c063bec80e1a5c959df38f

  • C:\Users\Admin\Documents\SetUpdate.doc.exe

    Filesize

    512KB

    MD5

    615b6e5b644763f6480ffb459e062c72

    SHA1

    27ed51cf6f59df4e39cb0122a21e8dadd1fb45c3

    SHA256

    7b33e475d1f4bcec6fc38d230f7535746970ce261bfab7b7d7abb0868ea269c2

    SHA512

    cf76f50cc8f114060d94a61d46cd9178da4fa61d988f633f2e256cadbec138fe04c1f2125eff0024f6cd36d5dca089dce684ccca272ca33f44c26ec2df27d4da

  • C:\Windows\SysWOW64\aeoxbrpokhoof.exe

    Filesize

    512KB

    MD5

    1109d2519f9d8c9aca3c1d74bd444fbc

    SHA1

    3d5cb6ed9bd00ed1a364a84c2211efd8e812c978

    SHA256

    8258cc24f636fa7ab748dabedf2420fa1bb7bce7a33af013f06ea00b4664de58

    SHA512

    0cd9ff3082e6c1e25926cc4fccbe117f4909dedcf2a9b8b0c8208488c6effba7614a205b5d639ec9a463eda4cae56c576b7a61b13ee6ea554ffc5358a06dc316

  • C:\Windows\SysWOW64\ezomkgoous.exe

    Filesize

    512KB

    MD5

    812c8ea3410bc4234249f332e9fa8ba0

    SHA1

    d9db7a072bed653ee63af0c74f4a21a8ea20f470

    SHA256

    d3b1ac7b86f9a52bf8b423b8077485a14a2230a58f5e8fa1bf70fa81a19a9be5

    SHA512

    2553bce90ba9c4380e776031ab49c7b7d5ecabe5ad4197b80d121115017b42a7ad7895cfb3fd7555c778c62ce404aa149e87e4dd89906654cc671ebc0f81933a

  • C:\Windows\SysWOW64\llzpcqqq.exe

    Filesize

    512KB

    MD5

    d45bb0576b930d9f3ba3a0ad4d7b9226

    SHA1

    fd7e13706fecd863ec551471a96cf7e80a05230c

    SHA256

    06b9b0c6ee4381efa203fad3b166242f93d6ec17eb6b973221e6cf6d14f70b11

    SHA512

    fda5b8fdaf2aae174e75fc293c4f6d073423f68a16f2bad8c31f0780dfe328c0004f6facba909bf7dd9cf7f5cb6459efef074827d7aa2e58fa0c8d379edba493

  • C:\Windows\SysWOW64\qwuygooyylpiqjf.exe

    Filesize

    512KB

    MD5

    f1b71c01daf94939fd815c0cfb2f4108

    SHA1

    fd2e077a15585a0d915257c0af94e947136cd8a9

    SHA256

    2dddde2ebf4bd3b2193a6097db8caee1e5cbe736a8fd5dda55477d82bfc10365

    SHA512

    eb080b8f5376db944ac5baf1cbd18f15251a295d2500d11ec59636011750cb0c1954bb8d10310ff73b4674af962ba10b2307d20ad2ec55a1ca20fde08862ace7

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6f783ae4a4ffb16ab42ec9bd4303e6b2

    SHA1

    d95e5e89fecfa26cfaf156d6e097bd79ef82fc6d

    SHA256

    b4ed93f88cd227b682048bba883f85570e968c6549b5a3c092458fa27c8dd37c

    SHA512

    385091141a1133c24c532f67257ef59ec9d4709d8cb769c4bd5f9b501b2259bdee6102d713136a38348128dba9c1aeb9123c6d1117005c776cd17ed8f61885e9

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    0bb290a38724326e07bb5868d8258c79

    SHA1

    08fb4d8450c5e531a951cf0e2a4ed4b55282584f

    SHA256

    54f423081a3457d454e02cd34d3ae853155cfaeeb2ce3903053ced4468127149

    SHA512

    f3c31d8f96ade4a57b37c86f0c2aff770fce7fa504d6f735d469c8ef15e3f3d9dd7d47207b49dc7141bb1c1f2879fb915e307e2ec574c5f3fa72a0cb72350bde

  • memory/860-39-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-38-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-37-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-36-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-35-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-40-0x00007FFA4B4B0000-0x00007FFA4B4C0000-memory.dmp

    Filesize

    64KB

  • memory/860-43-0x00007FFA4B4B0000-0x00007FFA4B4C0000-memory.dmp

    Filesize

    64KB

  • memory/860-611-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-612-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-613-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/860-610-0x00007FFA4DA10000-0x00007FFA4DA20000-memory.dmp

    Filesize

    64KB

  • memory/3360-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB