Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe
-
Size
512KB
-
MD5
eac2712819daf5338c34a426fbfd5e44
-
SHA1
0bff35d5cb2441a0a8eb3203e46a5804a187781c
-
SHA256
46a1fa80fa54b56180d9dc8f4dfc144a0510089fec0d500d609ff1798cbd3287
-
SHA512
43773a04ad780d297442fe81b3d154baa9aa86c0d06a42e5aea08cd02717b03e59bbe96cc16128b83d00065d96122287f20c9d8c0208b0e8c4cd113f87b03d33
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" evptmmyhow.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" evptmmyhow.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" evptmmyhow.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" evptmmyhow.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 3520 evptmmyhow.exe 3052 oxnkhkjvkfvcfez.exe 5096 trponssq.exe 2288 gtdeheizsyxlo.exe 2392 trponssq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" evptmmyhow.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\esekhcrp = "evptmmyhow.exe" oxnkhkjvkfvcfez.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lujmwlrl = "oxnkhkjvkfvcfez.exe" oxnkhkjvkfvcfez.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "gtdeheizsyxlo.exe" oxnkhkjvkfvcfez.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: trponssq.exe File opened (read-only) \??\h: evptmmyhow.exe File opened (read-only) \??\w: evptmmyhow.exe File opened (read-only) \??\l: trponssq.exe File opened (read-only) \??\u: evptmmyhow.exe File opened (read-only) \??\p: trponssq.exe File opened (read-only) \??\j: evptmmyhow.exe File opened (read-only) \??\b: trponssq.exe File opened (read-only) \??\n: trponssq.exe File opened (read-only) \??\x: trponssq.exe File opened (read-only) \??\v: trponssq.exe File opened (read-only) \??\a: evptmmyhow.exe File opened (read-only) \??\y: evptmmyhow.exe File opened (read-only) \??\j: trponssq.exe File opened (read-only) \??\t: trponssq.exe File opened (read-only) \??\b: trponssq.exe File opened (read-only) \??\i: trponssq.exe File opened (read-only) \??\u: trponssq.exe File opened (read-only) \??\o: trponssq.exe File opened (read-only) \??\p: trponssq.exe File opened (read-only) \??\q: trponssq.exe File opened (read-only) \??\z: trponssq.exe File opened (read-only) \??\i: evptmmyhow.exe File opened (read-only) \??\r: trponssq.exe File opened (read-only) \??\g: trponssq.exe File opened (read-only) \??\h: trponssq.exe File opened (read-only) \??\l: trponssq.exe File opened (read-only) \??\m: trponssq.exe File opened (read-only) \??\n: trponssq.exe File opened (read-only) \??\s: trponssq.exe File opened (read-only) \??\e: evptmmyhow.exe File opened (read-only) \??\v: evptmmyhow.exe File opened (read-only) \??\v: trponssq.exe File opened (read-only) \??\h: trponssq.exe File opened (read-only) \??\t: trponssq.exe File opened (read-only) \??\w: trponssq.exe File opened (read-only) \??\g: evptmmyhow.exe File opened (read-only) \??\k: evptmmyhow.exe File opened (read-only) \??\z: trponssq.exe File opened (read-only) \??\x: evptmmyhow.exe File opened (read-only) \??\z: evptmmyhow.exe File opened (read-only) \??\i: trponssq.exe File opened (read-only) \??\s: trponssq.exe File opened (read-only) \??\g: trponssq.exe File opened (read-only) \??\b: evptmmyhow.exe File opened (read-only) \??\o: evptmmyhow.exe File opened (read-only) \??\m: trponssq.exe File opened (read-only) \??\y: trponssq.exe File opened (read-only) \??\t: evptmmyhow.exe File opened (read-only) \??\a: trponssq.exe File opened (read-only) \??\q: trponssq.exe File opened (read-only) \??\w: trponssq.exe File opened (read-only) \??\k: trponssq.exe File opened (read-only) \??\x: trponssq.exe File opened (read-only) \??\q: evptmmyhow.exe File opened (read-only) \??\r: evptmmyhow.exe File opened (read-only) \??\e: trponssq.exe File opened (read-only) \??\s: evptmmyhow.exe File opened (read-only) \??\a: trponssq.exe File opened (read-only) \??\e: trponssq.exe File opened (read-only) \??\j: trponssq.exe File opened (read-only) \??\r: trponssq.exe File opened (read-only) \??\m: evptmmyhow.exe File opened (read-only) \??\p: evptmmyhow.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" evptmmyhow.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" evptmmyhow.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1912-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00070000000234a5-5.dat autoit_exe behavioral2/files/0x000900000002348e-18.dat autoit_exe behavioral2/files/0x00070000000234a6-24.dat autoit_exe behavioral2/files/0x00070000000234a7-31.dat autoit_exe behavioral2/files/0x00070000000234b3-73.dat autoit_exe behavioral2/files/0x00070000000234c6-97.dat autoit_exe behavioral2/files/0x00070000000234c6-99.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe trponssq.exe File created C:\Windows\SysWOW64\evptmmyhow.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\oxnkhkjvkfvcfez.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gtdeheizsyxlo.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll evptmmyhow.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe trponssq.exe File opened for modification C:\Windows\SysWOW64\evptmmyhow.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File created C:\Windows\SysWOW64\oxnkhkjvkfvcfez.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File created C:\Windows\SysWOW64\trponssq.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\trponssq.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File created C:\Windows\SysWOW64\gtdeheizsyxlo.exe eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe trponssq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe trponssq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe trponssq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe trponssq.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal trponssq.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal trponssq.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal trponssq.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe trponssq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe trponssq.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe trponssq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe trponssq.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe trponssq.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe trponssq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe trponssq.exe File opened for modification C:\Windows\mydoc.rtf eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe trponssq.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe trponssq.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe trponssq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evptmmyhow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxnkhkjvkfvcfez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trponssq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtdeheizsyxlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trponssq.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc evptmmyhow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf evptmmyhow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs evptmmyhow.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B02844EE39ED53BFB9D133EFD4BC" eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh evptmmyhow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat evptmmyhow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" evptmmyhow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg evptmmyhow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8FFC83485F856D9130D75B7D9CBCE7E6315837664F6332D79B" eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC7741591DAB6B9BA7CE8ECE734BE" eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" evptmmyhow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" evptmmyhow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" evptmmyhow.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABAF9BCF963F19283783B4A86EA3E97B0FB028B4215033AE1C8429E09A0" eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" evptmmyhow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" evptmmyhow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462D7E9D5082206A3176DD772F2CD67D8165DE" eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F468B6FE1821AAD278D0D48B7B906A" eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 956 WINWORD.EXE 956 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 2392 trponssq.exe 2392 trponssq.exe 2392 trponssq.exe 2392 trponssq.exe 2392 trponssq.exe 2392 trponssq.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2392 trponssq.exe 2392 trponssq.exe 2392 trponssq.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3052 oxnkhkjvkfvcfez.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 3520 evptmmyhow.exe 5096 trponssq.exe 5096 trponssq.exe 5096 trponssq.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2288 gtdeheizsyxlo.exe 2392 trponssq.exe 2392 trponssq.exe 2392 trponssq.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE 956 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3520 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 82 PID 1912 wrote to memory of 3520 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 82 PID 1912 wrote to memory of 3520 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 82 PID 1912 wrote to memory of 3052 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 83 PID 1912 wrote to memory of 3052 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 83 PID 1912 wrote to memory of 3052 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 83 PID 1912 wrote to memory of 5096 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 84 PID 1912 wrote to memory of 5096 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 84 PID 1912 wrote to memory of 5096 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 84 PID 1912 wrote to memory of 2288 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 85 PID 1912 wrote to memory of 2288 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 85 PID 1912 wrote to memory of 2288 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 85 PID 1912 wrote to memory of 956 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 86 PID 1912 wrote to memory of 956 1912 eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe 86 PID 3520 wrote to memory of 2392 3520 evptmmyhow.exe 88 PID 3520 wrote to memory of 2392 3520 evptmmyhow.exe 88 PID 3520 wrote to memory of 2392 3520 evptmmyhow.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac2712819daf5338c34a426fbfd5e44_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\evptmmyhow.exeevptmmyhow.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\trponssq.exeC:\Windows\system32\trponssq.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2392
-
-
-
C:\Windows\SysWOW64\oxnkhkjvkfvcfez.exeoxnkhkjvkfvcfez.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3052
-
-
C:\Windows\SysWOW64\trponssq.exetrponssq.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5096
-
-
C:\Windows\SysWOW64\gtdeheizsyxlo.exegtdeheizsyxlo.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2288
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:956
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5e3bda25d32bf676c04e0bdd5a5567a2d
SHA1d9f81b43bad3016f96125d7006a0bb4e7c8f0535
SHA256fec41eb74c1ec9c0ff461ed2ef46729c47268861944d9517cd90b93937c4f7c7
SHA512850b63b8e4fbf2b926965fb42d4b096c89593f7b472b7920586eae09223201eb719b17cdc98477948d636fe2d4100d83f697eed8db80ab4732edae3b867473b8
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
396B
MD5c0580e90d3facd63a6c005aa72977300
SHA142f0161fc2e9b1a089be4369f1537bb67f0466aa
SHA2567b41783d5cdb79d089ab4bdea71f186d10ac2f948f68b450dfbaf0c084950e17
SHA5123c6ffa6204f8cc27e9c69030cc9bffb337ef025bd6db569a99432ef6d0f9906598a27d88045ae1e0aa9beaae67ff67f3ff90e6e28f986a3944b4c71c352b3593
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5acc3a002796f28f0822d8742fb50c606
SHA1c0a2656191a6befa2f27cf19a6e1ec769d706989
SHA256de71c2e1a45c5e50c71dc66bedbbbfb6463fec3eafa1072db95024d508817360
SHA512110142165206b60ec43e4b5ae70432b5477e20a7c444d6920b66cfb01cdc209211871666e37ac5ae65b7690c534574ffe01e794100142ecac292a90210407e3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5dab2fb9330fa0c186bfd0104b3bd7877
SHA117e8ea88151ac2461a0c39c118df0945d462f7d0
SHA25655e92ff2d3e0a1e9fe57b244c1db4b3a204b5796eec7c3a4db4dcc6e452a977a
SHA512c8f7aa044b61b02a35817b3e1c1829468c3df0d28dc97cd3205af557407ae974003b96aceb7fe8b9c46c0dd1c1bffde2c3d49b3fc9cf2f8c087d295fd7f89f1a
-
Filesize
512KB
MD5e52f90b88c7fc0568c5b266342da4763
SHA1114b95a8cae6ed8db9410d19f703c568f43824c3
SHA256b9593f180ebd67001e66e14e6f8531bdf2ebeb234e8424e9f77d035cd46f7014
SHA512bb04d5365f7f3c19189b367a7447a46d9df4a0794521496cb0e8903c5685b3a2ab92a77a2d748c5e69242cae9653a0d8213fce572e9e295fd08bb1c21294e41b
-
Filesize
512KB
MD5a8e227fd4e70d3632a2ebc62b55915e1
SHA1eee65b46c251675eab0fa1a4231e5b58c6c6907f
SHA25684e6e20abf6536b34c0755a4af27c897973b1dcd79ecdcdf029ec293114e91e7
SHA5120ed4d4d29de4c4819bf61c2c9a1e2864caeb82f4c90a8d63e3abca72fe4b98b6d0f6e8fc57973839c2502111cc1c3e36592614b66a3f18117d0bdf62a556074d
-
Filesize
512KB
MD5e5d7a8ead29ef0164ace64342fe2e196
SHA1c1603b21afc85e231b261ecfffd76b1297d8b54d
SHA25620d2be81a1565661a07a60e712a75a77593f451e2f2388a8b698b2c7dd4a422b
SHA5124348927fedd4576e206dc8ab535d62b772525630d7a34583b8281335626a0979275d25bbe67e57cac5264d4292cd1b6415cc1d97b649b3ab5aae0319ecc78f62
-
Filesize
512KB
MD5d5825343799309f1a48e0308a4c5ec3a
SHA1b37c7f379e5a442cb416f3ac709ce71b37e82519
SHA256b5172fc883db7644dceb7bdcc9eaed4b1bb19a49d422f8a29e8ded4e1c84d1ac
SHA512b23103e6e40270b1d2faaba65816cc11346f4f00747daacee6eb6b68e6625d7a3b742688b334171197debf48c739df73defd54e5f9a1efb7063c28acf3ae8a4d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5b08fce76346ac94b60edb1f5f6c5a02e
SHA142f1f1e67b04d37cfed4b81434dc37b2178f82e3
SHA2561658008b98edef6dd5b9c066c231b1b9af838fb8ca361a2c478f690b3b98fb82
SHA512f2b130ddf7c052b31ca32a7fef4323e78212c2d25220e37e472a1759d3f2453c79cc1f501e21a5c13bea9aecb4f654bc62baef29296630c4c3702596b797e67b
-
Filesize
512KB
MD5ce4044cf6d97723977b986a8bcd253ca
SHA1c911dd4a6d12349e602c5329bf12784594e7f50a
SHA256e762a5db48e383f8abd14d757122ef93fbf13f35afc7fba1c4adee1a216ebcbb
SHA51210ccb7f6a28b0ad25f4b389cc3a8e8eef1286de1302185910ca88a0ace2643f239da84ebe47824fe634ec0eecd9fbcebc8b56492e5ddd5678f39ff2e4481f203