Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:28

General

  • Target

    eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    eac2712819daf5338c34a426fbfd5e44

  • SHA1

    0bff35d5cb2441a0a8eb3203e46a5804a187781c

  • SHA256

    46a1fa80fa54b56180d9dc8f4dfc144a0510089fec0d500d609ff1798cbd3287

  • SHA512

    43773a04ad780d297442fe81b3d154baa9aa86c0d06a42e5aea08cd02717b03e59bbe96cc16128b83d00065d96122287f20c9d8c0208b0e8c4cd113f87b03d33

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 24 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\evptmmyhow.exe
      evptmmyhow.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\trponssq.exe
        C:\Windows\system32\trponssq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2572
    • C:\Windows\SysWOW64\oxnkhkjvkfvcfez.exe
      oxnkhkjvkfvcfez.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2528
    • C:\Windows\SysWOW64\trponssq.exe
      trponssq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2700
    • C:\Windows\SysWOW64\gtdeheizsyxlo.exe
      gtdeheizsyxlo.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2696
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:772
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2592

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      2a66777f51e1af26bd353aa7563e165a

      SHA1

      287323bb4f0c71ce49ed4ef080f7102760a8df18

      SHA256

      8f8c8b6af0b4380dc06ca9798d586eac7087f6899372816c169ed736faa9d83f

      SHA512

      f1e47c1588f277b3550b8600bd3241e1a3d00b4a55b2d91f276c2a2859a4bd7f179259ee75474c72fc5abb0613bb7c33e1ff63b3c9cb9eacfe01dba0b3ab4485

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      401B

      MD5

      8359f47a1a3f6edf5c916c5b05f794ba

      SHA1

      8a7ba5fcef42b63b4c792b48e26f2e733308cace

      SHA256

      e9c318f37bce7d90551bc464260ce2363c356be3aaf4abf52b1c1ba2a7a3a2cf

      SHA512

      831dfd8a0defb522c92d33464649d2f5dfccd8b4a271c5533d280323fb4c870b70c4733b1d241a39aad7064ab5234cfd5ef4bafbb8e790a740176966c452c85b

    • C:\Windows\SysWOW64\trponssq.exe

      Filesize

      512KB

      MD5

      43b81f0b7c47ad6e176e36d820435eb1

      SHA1

      83f9b8f330b905c204330e103e56f3b57fdadf56

      SHA256

      cbe11b108779f38c6e6ad30f0be97210c05dee51e33d127ddb3b741cf1338650

      SHA512

      923d252b2876cc0369e1b73289396e69d59699f9f19ada26e5c9257619349b43345ba7ada7036de63fa96f8a5267829c28998b21ced5768e6f5cb3d1af2f1ee3

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\evptmmyhow.exe

      Filesize

      512KB

      MD5

      4fe063421548dc660dbf5e1f02516d87

      SHA1

      b4d2c1f90a4a08e99013439b91525ef73c0c01d2

      SHA256

      4f735dc6ea28c3260130bbdf2f038d62cad0b21be0227186c122ff8e79651e67

      SHA512

      36e5b1b71a8e1460121bd71727a867160219b40f05b37728ebc1d1f7d878236fa83934536cb3f57e250ed698e51935b94354d0feb626d00cb76b5f3fb16bdb12

    • \Windows\SysWOW64\gtdeheizsyxlo.exe

      Filesize

      512KB

      MD5

      5f5e37fd3e75418329203dffe5811454

      SHA1

      24613c586be5c58c5a8f1d01d55bd7599d016ee3

      SHA256

      b693145c6a936d4262c3f4a4f060e98dd86c2c34912955c93d6ca156a5407aae

      SHA512

      a4173d28f3e9dce465b20ce2542d6a500681cbf6eab69d9cb4ccc7ad8da708cb8e5ed254abf71cff11afe6610b9f88999a18d62dac91a9b7c6662a09eebc81c2

    • \Windows\SysWOW64\oxnkhkjvkfvcfez.exe

      Filesize

      512KB

      MD5

      90d9ddee01610e5d00c6bc9c3c8bb4c7

      SHA1

      14b06fcb7ebcf5502703e9b42fede8909f7d3e65

      SHA256

      e213056283269b1723a529239a3e23a18c0bb50eb0c9a627d89a8a7cd35e10d5

      SHA512

      1af6b6f85843f18221ecdcf035b628741726235a047453d20abe751e30baea0cdc2855c9f9d80b64b30638d3defb9442ba2a851caf579b5b39b2c27759383d14

    • memory/1964-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2320-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2592-82-0x0000000003C50000-0x0000000003C60000-memory.dmp

      Filesize

      64KB