Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 21:58

General

  • Target

    ee80c5a1ce5235acc8369c9f821db516_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ee80c5a1ce5235acc8369c9f821db516

  • SHA1

    f3e935160b66734adcc2c81a9f53e14f0a5181b3

  • SHA256

    7dcec6a0a04b60e27014f9c89a0bc397b54f95743e295784b95873a91a5ab6e3

  • SHA512

    949f252078424bf63b8faa0addcb2de3683fd88377efa47aedff744526e253b89ca23ea1f3a27d47bb36340f5b3aa770c2b614e326be0c9ff92ad813961bf27d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm51

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 24 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee80c5a1ce5235acc8369c9f821db516_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee80c5a1ce5235acc8369c9f821db516_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\SysWOW64\axkgwkbbpg.exe
      axkgwkbbpg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\SysWOW64\dtotdrpy.exe
        C:\Windows\system32\dtotdrpy.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2764
    • C:\Windows\SysWOW64\sweblxafgakiigp.exe
      sweblxafgakiigp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1964
    • C:\Windows\SysWOW64\dtotdrpy.exe
      dtotdrpy.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:916
    • C:\Windows\SysWOW64\lexuzggntzali.exe
      lexuzggntzali.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2896
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:924
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      b9ec3462d628b9d7f6ffb5c57fa1a7f8

      SHA1

      538f366d894f8e783efd8d7387221bc6792bb95e

      SHA256

      83b4643ae6c132fae0847e59e841258ccb2e88b95c0c7a2919d6fc2e2e499286

      SHA512

      3f34b52a2b04fe22d2a9a5f39c1c2a5e9b3fc1b8ddd3e343a560f76e5c903141b488b41e850e7424fe2bb8fda872aaeb580bf2ad7507089aa7b26d498f3c9429

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      e886641de572930a9ef9a6caec9a4496

      SHA1

      f4540cb4dd4629d07bf2dd948aa14f5dd5bd0c39

      SHA256

      629c3c8c1321677fe759e7b866a50109430603e594c682e88ff9e464e44d4e52

      SHA512

      57373eab47bf29b98feed3b7502713206d90b878a383acd5c27bde314ad5738192db641b402b83aa31f86feca13efce447290c27b753fbd38b52093e0e9977a8

    • C:\Windows\SysWOW64\axkgwkbbpg.exe

      Filesize

      512KB

      MD5

      5481da074d894b13bff42372712f2e7c

      SHA1

      511fdbb9f7ce61bcb12f38987fa56f6e3341ef94

      SHA256

      c31fb096e4b9f28d7584495eb5c4653d5ebfb196bd2443210fa47b184551b093

      SHA512

      e21bc4914dd8e5297c775cf71c657377671154dc4b36980ed64cb156e02717cf76263e626d6e9bf0cbb72f1d4201b2901e2c6673c31f049fa9ade4214e308c26

    • C:\Windows\SysWOW64\dtotdrpy.exe

      Filesize

      512KB

      MD5

      adecadeaed34339f096fa9a2a3c160e5

      SHA1

      c639f92348a5b64b3139ad8aac3cfc70903cd7fc

      SHA256

      fa5550f4146f4846e01c10a44da0f7539e2d693f40c3c6fb8660b6427e360cc8

      SHA512

      aea365e9e8ddf7268d569e8c4ea8e2fd8b67803052246c1bca7cc86061c4f9510c04906dea723e48c66bcb8d5cec542f1195831e4e751e6b64cc22e61af24c43

    • C:\Windows\SysWOW64\lexuzggntzali.exe

      Filesize

      512KB

      MD5

      08fafedd141765f2759885b0e6051733

      SHA1

      0659e73b79def72f8570788fe7081efeebd088b9

      SHA256

      012ae1c0c9ab7464e990a8534c174056ed1056364b4bc7ccd40b56a272614ac4

      SHA512

      e0d3b282b6a23ed5618332d9fc7d3b662f04d583f4f3ce83f1df2d431545daddb4ff040175cbf154d6b6553c1f8cae0a7421bb9450d53610e38f98411c2e5c58

    • C:\Windows\SysWOW64\sweblxafgakiigp.exe

      Filesize

      512KB

      MD5

      e1375a0429d82e540b843a91a708c754

      SHA1

      089b21ca246bcbdd46c3e7c33ebd6c79e0241bdc

      SHA256

      b89f05d2a05eb2c36a0694e4021266f81795a5041f57271771fabdfa6b4ee1d1

      SHA512

      148e13ebb6f87811ba3a058094d5303eb11d83a057a912e73a2f41e9e1d8de47763da595f9520388361fff1562bf51ecfd7b6b1a26c6b26308a709ee341b7956

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • memory/1288-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/1988-81-0x0000000003D60000-0x0000000003D70000-memory.dmp

      Filesize

      64KB

    • memory/2884-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB