Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe
-
Size
512KB
-
MD5
ea74a30434592a4890be2e6b6945e9f3
-
SHA1
02eaa622cc6ec787393e4c2bf4c1972932ca4f48
-
SHA256
628aa0bc37ab01ae98277fe219cec0e3deb65c0409fbfef2edc1e5705e0593e8
-
SHA512
05bdce325193db3f9d452aa3343f71c82d4a542425e6c0297d422d058b3348bf40f80bf9944044659e400f7072ef19bc84190a6c56f2c9f78bdfb2e03fa5aa9e
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5n
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ezomkgoous.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ezomkgoous.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ezomkgoous.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ezomkgoous.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 1728 ezomkgoous.exe 1488 qwuygooyylpiqjf.exe 4832 aeoxbrpokhoof.exe 4024 llzpcqqq.exe 740 llzpcqqq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ezomkgoous.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\widoyvwt = "ezomkgoous.exe" qwuygooyylpiqjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gimgslic = "qwuygooyylpiqjf.exe" qwuygooyylpiqjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "aeoxbrpokhoof.exe" qwuygooyylpiqjf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: llzpcqqq.exe File opened (read-only) \??\v: llzpcqqq.exe File opened (read-only) \??\w: ezomkgoous.exe File opened (read-only) \??\y: llzpcqqq.exe File opened (read-only) \??\w: llzpcqqq.exe File opened (read-only) \??\e: llzpcqqq.exe File opened (read-only) \??\j: llzpcqqq.exe File opened (read-only) \??\q: llzpcqqq.exe File opened (read-only) \??\t: llzpcqqq.exe File opened (read-only) \??\t: ezomkgoous.exe File opened (read-only) \??\n: ezomkgoous.exe File opened (read-only) \??\t: llzpcqqq.exe File opened (read-only) \??\b: llzpcqqq.exe File opened (read-only) \??\n: llzpcqqq.exe File opened (read-only) \??\y: llzpcqqq.exe File opened (read-only) \??\o: llzpcqqq.exe File opened (read-only) \??\u: llzpcqqq.exe File opened (read-only) \??\r: ezomkgoous.exe File opened (read-only) \??\u: ezomkgoous.exe File opened (read-only) \??\l: llzpcqqq.exe File opened (read-only) \??\k: llzpcqqq.exe File opened (read-only) \??\p: llzpcqqq.exe File opened (read-only) \??\r: llzpcqqq.exe File opened (read-only) \??\x: llzpcqqq.exe File opened (read-only) \??\a: ezomkgoous.exe File opened (read-only) \??\j: llzpcqqq.exe File opened (read-only) \??\m: llzpcqqq.exe File opened (read-only) \??\p: llzpcqqq.exe File opened (read-only) \??\b: ezomkgoous.exe File opened (read-only) \??\i: ezomkgoous.exe File opened (read-only) \??\j: ezomkgoous.exe File opened (read-only) \??\v: ezomkgoous.exe File opened (read-only) \??\b: llzpcqqq.exe File opened (read-only) \??\r: llzpcqqq.exe File opened (read-only) \??\z: llzpcqqq.exe File opened (read-only) \??\g: llzpcqqq.exe File opened (read-only) \??\h: ezomkgoous.exe File opened (read-only) \??\x: ezomkgoous.exe File opened (read-only) \??\p: ezomkgoous.exe File opened (read-only) \??\g: llzpcqqq.exe File opened (read-only) \??\n: llzpcqqq.exe File opened (read-only) \??\s: ezomkgoous.exe File opened (read-only) \??\e: llzpcqqq.exe File opened (read-only) \??\y: ezomkgoous.exe File opened (read-only) \??\i: llzpcqqq.exe File opened (read-only) \??\m: ezomkgoous.exe File opened (read-only) \??\i: llzpcqqq.exe File opened (read-only) \??\s: llzpcqqq.exe File opened (read-only) \??\a: llzpcqqq.exe File opened (read-only) \??\w: llzpcqqq.exe File opened (read-only) \??\z: llzpcqqq.exe File opened (read-only) \??\k: llzpcqqq.exe File opened (read-only) \??\h: llzpcqqq.exe File opened (read-only) \??\q: llzpcqqq.exe File opened (read-only) \??\v: llzpcqqq.exe File opened (read-only) \??\h: llzpcqqq.exe File opened (read-only) \??\o: llzpcqqq.exe File opened (read-only) \??\s: llzpcqqq.exe File opened (read-only) \??\k: ezomkgoous.exe File opened (read-only) \??\a: llzpcqqq.exe File opened (read-only) \??\m: llzpcqqq.exe File opened (read-only) \??\e: ezomkgoous.exe File opened (read-only) \??\g: ezomkgoous.exe File opened (read-only) \??\o: ezomkgoous.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ezomkgoous.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ezomkgoous.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3360-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000a000000023ba2-5.dat autoit_exe behavioral2/files/0x000b000000023b9e-18.dat autoit_exe behavioral2/files/0x000a000000023ba4-26.dat autoit_exe behavioral2/files/0x000a000000023ba3-31.dat autoit_exe behavioral2/files/0x0008000000023aea-65.dat autoit_exe behavioral2/files/0x000b000000023b96-71.dat autoit_exe behavioral2/files/0x0009000000023bd4-85.dat autoit_exe behavioral2/files/0x0010000000023ce3-583.dat autoit_exe behavioral2/files/0x0010000000023ce3-588.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\ezomkgoous.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File created C:\Windows\SysWOW64\qwuygooyylpiqjf.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aeoxbrpokhoof.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File created C:\Windows\SysWOW64\aeoxbrpokhoof.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ezomkgoous.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification C:\Windows\SysWOW64\ezomkgoous.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qwuygooyylpiqjf.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File created C:\Windows\SysWOW64\llzpcqqq.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\llzpcqqq.exe ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe llzpcqqq.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe llzpcqqq.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe llzpcqqq.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe llzpcqqq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe llzpcqqq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe llzpcqqq.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe llzpcqqq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe llzpcqqq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal llzpcqqq.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe llzpcqqq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe llzpcqqq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe llzpcqqq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe llzpcqqq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe llzpcqqq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification C:\Windows\mydoc.rtf ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe llzpcqqq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe llzpcqqq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe llzpcqqq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aeoxbrpokhoof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwuygooyylpiqjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llzpcqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llzpcqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezomkgoous.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ezomkgoous.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ezomkgoous.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4F9CAFE13F290830C3B3786ED3E98B3FD02F84268034BE2CF42EA08D3" ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B15F44E438E253CDB9D333EDD4BC" ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183EC6781594DAC7B9BE7CE8ED9734CA" ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ezomkgoous.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462D0D9C2683526A3776D770522CAA7CF465DA" ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FF82482F82199141D65A7E95BDE2E146593067316331D7E9" ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F66BC3FE1B21AED179D1A88B7E9011" ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ezomkgoous.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ezomkgoous.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ezomkgoous.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 860 WINWORD.EXE 860 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 1488 qwuygooyylpiqjf.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 1488 qwuygooyylpiqjf.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 1728 ezomkgoous.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 4832 aeoxbrpokhoof.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 1488 qwuygooyylpiqjf.exe 4024 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe 740 llzpcqqq.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE 860 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3360 wrote to memory of 1728 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 85 PID 3360 wrote to memory of 1728 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 85 PID 3360 wrote to memory of 1728 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 85 PID 3360 wrote to memory of 1488 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 86 PID 3360 wrote to memory of 1488 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 86 PID 3360 wrote to memory of 1488 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 86 PID 3360 wrote to memory of 4024 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 87 PID 3360 wrote to memory of 4024 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 87 PID 3360 wrote to memory of 4024 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 87 PID 3360 wrote to memory of 4832 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 88 PID 3360 wrote to memory of 4832 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 88 PID 3360 wrote to memory of 4832 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 88 PID 3360 wrote to memory of 860 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 89 PID 3360 wrote to memory of 860 3360 ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe 89 PID 1728 wrote to memory of 740 1728 ezomkgoous.exe 91 PID 1728 wrote to memory of 740 1728 ezomkgoous.exe 91 PID 1728 wrote to memory of 740 1728 ezomkgoous.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea74a30434592a4890be2e6b6945e9f3_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\ezomkgoous.exeezomkgoous.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\llzpcqqq.exeC:\Windows\system32\llzpcqqq.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:740
-
-
-
C:\Windows\SysWOW64\qwuygooyylpiqjf.exeqwuygooyylpiqjf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1488
-
-
C:\Windows\SysWOW64\llzpcqqq.exellzpcqqq.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4024
-
-
C:\Windows\SysWOW64\aeoxbrpokhoof.exeaeoxbrpokhoof.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4832
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:860
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56bb47aaadd794384e854732c2ecbc8ab
SHA168b6fa5cb337dce5916b6396da2221f378b572ef
SHA256888b57dd1f9d3190b47f40b766d3b14fd68d5248f0d62ade483c1f93aa13f243
SHA5120b8e44a14129ba52c53f3aa12f4a98a6cf8ad01128eac621d1f99c97dd31e4e73cff0e7ab8e5adfe014a654d5e10022186d1c0aa1436bfb8cde48f7b84320968
-
Filesize
512KB
MD50383aab1056e730ac19bbfafb8ab5914
SHA1551db3ff626444e2fccefe2903a27f480c0ccc89
SHA2566ac1841633253c32bb9b7a3d6e45a6de9f3f0c1dd1e936cc2821f86fd013ee78
SHA512fd9eb702e7b97773c80035d515bd57dc37d6606f07eb7a0940f407d229a74e58e67d6536cd24fea9758db2782715520b959f19af7081651ccba61240833ed040
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
311B
MD5b9feef4c812a60e2c6f11d7938bc88ce
SHA16a662e689a87947dc9f5a9efee09c0ca4abd205c
SHA25682f7ccaa70f870b91fa4b14956bdeca4c4510432ec670ed741e960fc223fc852
SHA51201cea936ff6620d8d6ad3d5e38538b7555d90168ce1e959b0cc279b7a219e0a23c39169d379a6df0ffe2eab88ec9d760504f99db2f1250a8b7214025933ced4b
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD512bfa35af543bfb879daf93be759f0f0
SHA1161f03179d5d178b3797c3bac2c55226fe4b0c87
SHA256c22814a7cf821e8c0d4f774fb111f5a9ad185374f174bc7ea7615f896c0e7934
SHA512241f88faa30b50c27f5b501924d5961b669ba0156446f6a4030429720eda11e8022854b38f46a8bc949242d447d679fe2b8a4edb4b07974afaaa420203c33949
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD57ef2d1b11b513abd92ce6c383df3dff6
SHA10bbaa633a1fabfd37e5a7a5289e38cae22e06353
SHA256a2de72f71800f566e4c5659649f087cadc8842e8e30256f694d76368f196ef3a
SHA512e0f41006486920c04eda8b9a43f888ecd301bf951736c80e80c226126fe026384cd6eb9f530da280075f682e907aa9e97a8dbea6b4c063bec80e1a5c959df38f
-
Filesize
512KB
MD5615b6e5b644763f6480ffb459e062c72
SHA127ed51cf6f59df4e39cb0122a21e8dadd1fb45c3
SHA2567b33e475d1f4bcec6fc38d230f7535746970ce261bfab7b7d7abb0868ea269c2
SHA512cf76f50cc8f114060d94a61d46cd9178da4fa61d988f633f2e256cadbec138fe04c1f2125eff0024f6cd36d5dca089dce684ccca272ca33f44c26ec2df27d4da
-
Filesize
512KB
MD51109d2519f9d8c9aca3c1d74bd444fbc
SHA13d5cb6ed9bd00ed1a364a84c2211efd8e812c978
SHA2568258cc24f636fa7ab748dabedf2420fa1bb7bce7a33af013f06ea00b4664de58
SHA5120cd9ff3082e6c1e25926cc4fccbe117f4909dedcf2a9b8b0c8208488c6effba7614a205b5d639ec9a463eda4cae56c576b7a61b13ee6ea554ffc5358a06dc316
-
Filesize
512KB
MD5812c8ea3410bc4234249f332e9fa8ba0
SHA1d9db7a072bed653ee63af0c74f4a21a8ea20f470
SHA256d3b1ac7b86f9a52bf8b423b8077485a14a2230a58f5e8fa1bf70fa81a19a9be5
SHA5122553bce90ba9c4380e776031ab49c7b7d5ecabe5ad4197b80d121115017b42a7ad7895cfb3fd7555c778c62ce404aa149e87e4dd89906654cc671ebc0f81933a
-
Filesize
512KB
MD5d45bb0576b930d9f3ba3a0ad4d7b9226
SHA1fd7e13706fecd863ec551471a96cf7e80a05230c
SHA25606b9b0c6ee4381efa203fad3b166242f93d6ec17eb6b973221e6cf6d14f70b11
SHA512fda5b8fdaf2aae174e75fc293c4f6d073423f68a16f2bad8c31f0780dfe328c0004f6facba909bf7dd9cf7f5cb6459efef074827d7aa2e58fa0c8d379edba493
-
Filesize
512KB
MD5f1b71c01daf94939fd815c0cfb2f4108
SHA1fd2e077a15585a0d915257c0af94e947136cd8a9
SHA2562dddde2ebf4bd3b2193a6097db8caee1e5cbe736a8fd5dda55477d82bfc10365
SHA512eb080b8f5376db944ac5baf1cbd18f15251a295d2500d11ec59636011750cb0c1954bb8d10310ff73b4674af962ba10b2307d20ad2ec55a1ca20fde08862ace7
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD56f783ae4a4ffb16ab42ec9bd4303e6b2
SHA1d95e5e89fecfa26cfaf156d6e097bd79ef82fc6d
SHA256b4ed93f88cd227b682048bba883f85570e968c6549b5a3c092458fa27c8dd37c
SHA512385091141a1133c24c532f67257ef59ec9d4709d8cb769c4bd5f9b501b2259bdee6102d713136a38348128dba9c1aeb9123c6d1117005c776cd17ed8f61885e9
-
Filesize
512KB
MD50bb290a38724326e07bb5868d8258c79
SHA108fb4d8450c5e531a951cf0e2a4ed4b55282584f
SHA25654f423081a3457d454e02cd34d3ae853155cfaeeb2ce3903053ced4468127149
SHA512f3c31d8f96ade4a57b37c86f0c2aff770fce7fa504d6f735d469c8ef15e3f3d9dd7d47207b49dc7141bb1c1f2879fb915e307e2ec574c5f3fa72a0cb72350bde