Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 07:54

General

  • Target

    ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ed254ea31781627675347fa45354dd1b

  • SHA1

    eec3e7cca8a07cfece6b1e53614d6cc965580629

  • SHA256

    1e0c8b666e9a71c2272d7265be04a8b12aa76517ba4d1536feeaf9f4fbf43211

  • SHA512

    73b2b0c2824442fbd3c62447a33fc539efcd495a62b9679ec457d50aae401a0446adfd4909e47f2cf116dc8e949e88501a3ff74ca7ff11fd43ece3e45e026fad

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5M

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\SysWOW64\avzrsuqwdn.exe
      avzrsuqwdn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\gjzjlpxs.exe
        C:\Windows\system32\gjzjlpxs.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2616
    • C:\Windows\SysWOW64\oktwpupestqbobp.exe
      oktwpupestqbobp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732
    • C:\Windows\SysWOW64\gjzjlpxs.exe
      gjzjlpxs.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2264
    • C:\Windows\SysWOW64\uwobjxcjaqlbv.exe
      uwobjxcjaqlbv.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2904
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      6feca4b20d162a1546b261f49e84da44

      SHA1

      5cddd778b3be6d92e48746e5e142987fa09cce42

      SHA256

      298bf76009c2dbfe002de5bd9a878371e364c7372a1150f70035260c97ef1e35

      SHA512

      19d8a53fcc1a7d30826bdd4830c926b9a16289d7fb0cd3a7b7682d5f10e2123a0edd8f88e17a795cd55c5a0acb7509f7a4e7ff414bf0514e01528c92e5cf82cb

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      0cf4fa95b5b845b2957ce659a47e8d7d

      SHA1

      100e286b09503d1948dd668cdd7f862739edca99

      SHA256

      bf68ab8ffbd6447d8a047252eb11a6644491bc2b26669f38b214d50705b08246

      SHA512

      5159a2aeb92e244633e39f018878aa1708b44cd5fa1853c3ee46e06b46a8396f8481beed3aac50018105b2a7b7cf23ac8e4161265b6b8a22c72ce0c7c22f00cf

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      5b4b1f7d36f57982df88df737b3befa4

      SHA1

      6d00d90c1de17d6916ad38b96a7f885e7adf651c

      SHA256

      82dbd70ebf0350e70a0d3c40afe35a3ef0ae2faa93386c0d4bbba2b03f636d6f

      SHA512

      84a0caa39b374bcddb9f58be62c8c698f461faf6f76469ea2528537c6859273ba836ddaae97a0ff6f247429ed6ed80682d606e15ef8943e0b7ff79f5091f001f

    • C:\Windows\SysWOW64\oktwpupestqbobp.exe

      Filesize

      512KB

      MD5

      ed254ea31781627675347fa45354dd1b

      SHA1

      eec3e7cca8a07cfece6b1e53614d6cc965580629

      SHA256

      1e0c8b666e9a71c2272d7265be04a8b12aa76517ba4d1536feeaf9f4fbf43211

      SHA512

      73b2b0c2824442fbd3c62447a33fc539efcd495a62b9679ec457d50aae401a0446adfd4909e47f2cf116dc8e949e88501a3ff74ca7ff11fd43ece3e45e026fad

    • C:\Windows\SysWOW64\uwobjxcjaqlbv.exe

      Filesize

      512KB

      MD5

      a49c090549a5a0344e8caff5105a4007

      SHA1

      c2eac885b354671bd32f2527b7c5b91ebd1dab91

      SHA256

      95fd9081207e4b06d144080e476cfed16b808ce6e52e548d7bb61705e6544560

      SHA512

      1ae6ceceb24e55451053db7c01b1cb1c17d90f4667e42d508ec0b1f3d62d162c8ec6f99fc90687b65b7cf206c229e798552a5e729013462604410b282df31658

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Users\Admin\Desktop\ImportConfirm.doc.exe

      Filesize

      512KB

      MD5

      fcb532d1ac3790b31ce28751eb43007f

      SHA1

      7def8574865c39fb247d3547b4a714d1a89af3e1

      SHA256

      efdeda89dfedf5b06ba98a320b146347e10888ed14688b21ad9ef4a4f13d7469

      SHA512

      75725cf2b4d565b2da0774c02e2a709d10267a4c45a4d94466a4498c7fccd35311ccb10b1f554cddb654fb63cfa6592d5e4570d38e1209333a19eaad80bae15e

    • \Windows\SysWOW64\avzrsuqwdn.exe

      Filesize

      512KB

      MD5

      a2ffa0775bda8c444c1416048b864f26

      SHA1

      7b8d0c44f1aed3abb544d76df78379178a7e297f

      SHA256

      589d422c029146ed79d0cc646a2d6eb088b7a1b9324e87fb15aedf6546c3156d

      SHA512

      f5ff4e0720ea1487915f75eb016cf3be609694acda1e614945432fc86020712f2ee6c386e22ead1c762c3592a0cd0d798780ebf5abf6d94bdfaa6cdfb74f8b98

    • \Windows\SysWOW64\gjzjlpxs.exe

      Filesize

      512KB

      MD5

      d613a88a2f4cff809dae87f046a4f7bc

      SHA1

      f0a193015a2a6e0e352992d405b7024ec5578a62

      SHA256

      33cc797e2acb28bb7063ed9dedbbdc8ddd1e7e49d80f133a81a96cd8942386e7

      SHA512

      905d435f3533f9b425232b96c69851300da196dcff0c7c561cad18813ff6f84aa6de7414a8d1d20c104589fa5b94d1a42b8f4ae876ccbf90b45d8f3d9b5cca6d

    • \Windows\SysWOW64\oktwpupestqbobp.exe

      Filesize

      512KB

      MD5

      7d290ee0190d6f60205bcaa419553c55

      SHA1

      a9f44109be1c20d7542c97b766883e79c6c0cda2

      SHA256

      4af4b595b5b27adf3337f9bd7a80a2fecaab8ba440127dca5df92878a414ed4c

      SHA512

      d3ff8f7d9e435d5e02119d128172c4e4f5a5cf9f4651a2bc39d6b8069d6794f8753ae61fc0b52d36d74365bdb717e1b9bd9fb927080941c54a238bddf397bd18

    • memory/1728-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1728-98-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2088-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB