Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 00:34

General

  • Target

    ec7e018e7d3f4282c2417a82f2c9e0b4_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ec7e018e7d3f4282c2417a82f2c9e0b4

  • SHA1

    585c4d967c406d5d94ed4b360b2f9d271f3efeb4

  • SHA256

    744d72ae2940926a48fee94069b438e496e884a4ad16da851365de8917c7dec7

  • SHA512

    164adfef8e844e3f029f61af77f004682780110c4cff6c46bee0e3158223f9953141c312d49bf64174c67cafecc1105424b8a82ddeb863e6213b19f506e01843

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5C

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec7e018e7d3f4282c2417a82f2c9e0b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec7e018e7d3f4282c2417a82f2c9e0b4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\efdxkbvovt.exe
      efdxkbvovt.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Windows\SysWOW64\kfhhldpl.exe
        C:\Windows\system32\kfhhldpl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2564
    • C:\Windows\SysWOW64\sggedzsukmutrls.exe
      sggedzsukmutrls.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4956
    • C:\Windows\SysWOW64\kfhhldpl.exe
      kfhhldpl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5076
    • C:\Windows\SysWOW64\uqlrlfhewjrlp.exe
      uqlrlfhewjrlp.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3976
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    b8430fc14ece191a870b9298efa35c52

    SHA1

    0fd11f739144016cfcfab0648cb0781b103f7cd6

    SHA256

    f1fa8d9c94c304ce962c93049599e53315b9826cefda1437bb297874879de083

    SHA512

    ffbf2b47c660affae788934f88442b8a5a5ea99aa97cdd0f64dc821a17bfad310f3508b3c2f99025b39a86b275a1c5ac1373bb00d906c5d3d5b915809926ac64

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    27a8e8dc110b9395446e5d0f5dbaaa77

    SHA1

    3b0ebc3a2aaf70590cc02f0ba5e7713ebf5a904e

    SHA256

    bdb563e93eff18b61ed774e72d6f9ec8ceb82ea1c8dd20e0c333120f038e1efe

    SHA512

    c72d0e864d2c40ed4a0a8809f3a13b4a3085ace7fe93c0ea38ada2270e68cfd73a346127e21847196465af0a3526d42a3fc63bd31bc89d7400725c71cab81a92

  • C:\Users\Admin\AppData\Local\Temp\TCDD408.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    361B

    MD5

    d976cb351f1110704f97b661c39319e4

    SHA1

    a0a4edd6203799701b7bdd9fc24da02ce49c4c84

    SHA256

    dcf059551f1c91818807c49ea58f65c777aba5762cdbef4168d519f1b592df1e

    SHA512

    1cec1585c2d06c6ca1a625888d4403b20d0815c63fcb958658a87bfc89adebb8d065879d5704b3b53af235316e445a437e56f290dfe7568e66bacf90006abbe6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    9935da226d3a256f669328f18dca3a41

    SHA1

    3c9a97601941f15bd097588ab83fe26e6fa24d11

    SHA256

    e2ecfbd9dd7ede23617193db355bc3353412c19376782e973b877059c32c90f0

    SHA512

    c0c9d60ed26a91be1622475f363659435276c1127c6715e766e6af3f0b571835f71aca1d1cb21b6887f2472ae9210d9a52f89b7297f435f5e5b7c9d5e9cb0385

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    ad7bb631ebac4fb03de3c82cadcbf0c7

    SHA1

    3c31289c15404f0a7b6692705f5a02e266e474a2

    SHA256

    409a518df2aa14e31b5fe913e3ef05521ea2a7d0668aaa832982906f8e633cc7

    SHA512

    20558db9eac97446cf59aaecc8bf113d3f4aee67a1bc5f7edcf8786f2402d958117a1de51bcdf989f67f5ab6175cb105ead0853fa45169c8b190238129d356ed

  • C:\Users\Admin\AppData\Roaming\PushStop.doc.exe

    Filesize

    512KB

    MD5

    b15935a49916896eb0c4d5f8d3a51522

    SHA1

    ff0048c19a2295df1842f21b7ac95db6025cf23e

    SHA256

    ee29bcef56a8c50ae5abcc2ac87b6a78964d02b6511d6be34fa1aa2e24929990

    SHA512

    74bdf4e0ce32967f0e7a9bf12b8b390a16a51529a03b813f61994f1bfc6e510c654bd69ec6bbc6489403acdedfdbf40a5038c6ff7d006760ec7a302484aac520

  • C:\Windows\SysWOW64\efdxkbvovt.exe

    Filesize

    512KB

    MD5

    c723228789245bdce294459a913e68c6

    SHA1

    00455cf37fe717436af894b4f3341b9943fea31d

    SHA256

    40efad761747ad3d811c924c8cf8baa17488a5f21c894f382c920ef4e55cc136

    SHA512

    70da8c11a58fb0474245d0b5055aaf8a79c94bd376f4f467c34823cf24cf8f32660cc98ced1140250c168eca71e25e5298bdda60837fdd319358172152b9605a

  • C:\Windows\SysWOW64\kfhhldpl.exe

    Filesize

    512KB

    MD5

    4a24271eb2fa259a1cec77d248632371

    SHA1

    3073e32df123d189e26a779977f6b3c2a951d5d9

    SHA256

    42ef6dfe6c2ce5c32ed52f30cb8a893449746735726f2a3e03f5c7663e52c66f

    SHA512

    45660863404f1e0e6c102fddf3d25dc0f6f76815c35aee5e4ef94a04330283d51c73f9714cfd5b645cb523f6ba9b3e849d5b88f35decfb296f37a220318bc9b2

  • C:\Windows\SysWOW64\sggedzsukmutrls.exe

    Filesize

    512KB

    MD5

    9be20acb904b01a9cbcf749a90253f1b

    SHA1

    60a4080b94c8b2a53628bb7358b5bd82639f5ffd

    SHA256

    3d6a285a069795b51ae551375841e053b43eca55157f9bb2026d7ed0de929fa1

    SHA512

    846e8d70a03eec7c82e6bc80ac09c5a13483276a765889ecce4a875d7bfcac764b9a703a56cf8289c4d364aee2994dc74402e67b266df0e2ce3e8ff849aba15b

  • C:\Windows\SysWOW64\uqlrlfhewjrlp.exe

    Filesize

    512KB

    MD5

    33b72867b8d0d490d35d1b3f3e92ad1d

    SHA1

    d1e268abe8fcc470c89752c2dd5a0171683eb1dc

    SHA256

    c2d4f33d662c59b2722180ccffd94b384cf7985e832530c0139f3f86da8fa93e

    SHA512

    fa7fec230854fbf366042c58fcf9dfbf545f2acc9782ce136a7ac0cc1e54659872382475100b9be208290cf1bc2ae5a455dae7159982cf8f6e2657e14446bc63

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a53fd383a993fef5013c6815989eadf3

    SHA1

    b5f8b808b45e58f0fa15a756228fb6e119703b85

    SHA256

    136183ec220b8ce7b1d8e1ce5045c0ad5d0e991efe95d89dfe8704dd123f8f5e

    SHA512

    c2a7c799c80b1088b8e9ec1b04d85485cc55437194d0588f8c9bba5c63b92c23461355323eca741a213d8fbd10c08ce653dab6a02d13a648dedd65008c401e19

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    b86523258a862857373e0fb88e831d9b

    SHA1

    dafd7f48761a2a153ff9cfb791d6b934fcf4c640

    SHA256

    34dcd02f88884546e191074a55488319fbaf20b5acb018971fbae5c0dce4c1a6

    SHA512

    470cd430a25b7e544755de0f149278f9a60ceeeb83bff6a5a2111cd786e7cd7609c1364f90c4bb234c8ce1b71093ccfe85fc55be0ebf89c830acaf14d219f016

  • memory/1972-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3316-36-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-38-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-35-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-39-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-42-0x00007FFBBD980000-0x00007FFBBD990000-memory.dmp

    Filesize

    64KB

  • memory/3316-43-0x00007FFBBD980000-0x00007FFBBD990000-memory.dmp

    Filesize

    64KB

  • memory/3316-37-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-604-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-606-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-605-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB

  • memory/3316-607-0x00007FFBC0130000-0x00007FFBC0140000-memory.dmp

    Filesize

    64KB