Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe
-
Size
512KB
-
MD5
ed254ea31781627675347fa45354dd1b
-
SHA1
eec3e7cca8a07cfece6b1e53614d6cc965580629
-
SHA256
1e0c8b666e9a71c2272d7265be04a8b12aa76517ba4d1536feeaf9f4fbf43211
-
SHA512
73b2b0c2824442fbd3c62447a33fc539efcd495a62b9679ec457d50aae401a0446adfd4909e47f2cf116dc8e949e88501a3ff74ca7ff11fd43ece3e45e026fad
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5M
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" eshwffymrd.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eshwffymrd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" eshwffymrd.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" eshwffymrd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 3724 eshwffymrd.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 640 hzeatxqglihqh.exe 1296 gzhjswfm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eshwffymrd.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\khnoyfjt = "eshwffymrd.exe" ljjmglgjumkzsvi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zxgkyeus = "ljjmglgjumkzsvi.exe" ljjmglgjumkzsvi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "hzeatxqglihqh.exe" ljjmglgjumkzsvi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: gzhjswfm.exe File opened (read-only) \??\r: eshwffymrd.exe File opened (read-only) \??\b: gzhjswfm.exe File opened (read-only) \??\w: gzhjswfm.exe File opened (read-only) \??\b: gzhjswfm.exe File opened (read-only) \??\n: gzhjswfm.exe File opened (read-only) \??\s: gzhjswfm.exe File opened (read-only) \??\x: eshwffymrd.exe File opened (read-only) \??\j: gzhjswfm.exe File opened (read-only) \??\p: gzhjswfm.exe File opened (read-only) \??\l: gzhjswfm.exe File opened (read-only) \??\z: gzhjswfm.exe File opened (read-only) \??\i: gzhjswfm.exe File opened (read-only) \??\a: eshwffymrd.exe File opened (read-only) \??\o: eshwffymrd.exe File opened (read-only) \??\s: eshwffymrd.exe File opened (read-only) \??\k: gzhjswfm.exe File opened (read-only) \??\m: gzhjswfm.exe File opened (read-only) \??\b: eshwffymrd.exe File opened (read-only) \??\h: eshwffymrd.exe File opened (read-only) \??\n: eshwffymrd.exe File opened (read-only) \??\e: gzhjswfm.exe File opened (read-only) \??\l: eshwffymrd.exe File opened (read-only) \??\w: eshwffymrd.exe File opened (read-only) \??\g: eshwffymrd.exe File opened (read-only) \??\v: eshwffymrd.exe File opened (read-only) \??\k: gzhjswfm.exe File opened (read-only) \??\a: gzhjswfm.exe File opened (read-only) \??\p: gzhjswfm.exe File opened (read-only) \??\u: gzhjswfm.exe File opened (read-only) \??\e: eshwffymrd.exe File opened (read-only) \??\y: gzhjswfm.exe File opened (read-only) \??\e: gzhjswfm.exe File opened (read-only) \??\t: gzhjswfm.exe File opened (read-only) \??\v: gzhjswfm.exe File opened (read-only) \??\w: gzhjswfm.exe File opened (read-only) \??\m: eshwffymrd.exe File opened (read-only) \??\a: gzhjswfm.exe File opened (read-only) \??\o: gzhjswfm.exe File opened (read-only) \??\q: eshwffymrd.exe File opened (read-only) \??\y: eshwffymrd.exe File opened (read-only) \??\z: gzhjswfm.exe File opened (read-only) \??\r: gzhjswfm.exe File opened (read-only) \??\g: gzhjswfm.exe File opened (read-only) \??\q: gzhjswfm.exe File opened (read-only) \??\s: gzhjswfm.exe File opened (read-only) \??\u: gzhjswfm.exe File opened (read-only) \??\g: gzhjswfm.exe File opened (read-only) \??\j: gzhjswfm.exe File opened (read-only) \??\x: gzhjswfm.exe File opened (read-only) \??\i: eshwffymrd.exe File opened (read-only) \??\j: eshwffymrd.exe File opened (read-only) \??\p: eshwffymrd.exe File opened (read-only) \??\v: gzhjswfm.exe File opened (read-only) \??\x: gzhjswfm.exe File opened (read-only) \??\h: gzhjswfm.exe File opened (read-only) \??\t: eshwffymrd.exe File opened (read-only) \??\u: eshwffymrd.exe File opened (read-only) \??\i: gzhjswfm.exe File opened (read-only) \??\n: gzhjswfm.exe File opened (read-only) \??\k: eshwffymrd.exe File opened (read-only) \??\z: eshwffymrd.exe File opened (read-only) \??\h: gzhjswfm.exe File opened (read-only) \??\m: gzhjswfm.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" eshwffymrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" eshwffymrd.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/692-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0009000000023c86-5.dat autoit_exe behavioral2/files/0x000c000000023ba4-18.dat autoit_exe behavioral2/files/0x0007000000023c8f-27.dat autoit_exe behavioral2/files/0x0007000000023c90-32.dat autoit_exe behavioral2/files/0x001c0000000234d1-71.dat autoit_exe behavioral2/files/0x0009000000023ca2-86.dat autoit_exe behavioral2/files/0x0008000000023cb6-224.dat autoit_exe behavioral2/files/0x0008000000023cb6-238.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\eshwffymrd.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gzhjswfm.exe File created C:\Windows\SysWOW64\eshwffymrd.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File created C:\Windows\SysWOW64\hzeatxqglihqh.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification C:\Windows\SysWOW64\ljjmglgjumkzsvi.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\hzeatxqglihqh.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gzhjswfm.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll eshwffymrd.exe File created C:\Windows\SysWOW64\ljjmglgjumkzsvi.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File created C:\Windows\SysWOW64\gzhjswfm.exe ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gzhjswfm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gzhjswfm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gzhjswfm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gzhjswfm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gzhjswfm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gzhjswfm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gzhjswfm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gzhjswfm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gzhjswfm.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gzhjswfm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gzhjswfm.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gzhjswfm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gzhjswfm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification C:\Windows\mydoc.rtf ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gzhjswfm.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe gzhjswfm.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe gzhjswfm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe gzhjswfm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe gzhjswfm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eshwffymrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljjmglgjumkzsvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzhjswfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hzeatxqglihqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzhjswfm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462D7B9C2182586A4376D6772F2CAC7CF564DD" ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "194AC77915E5DAB0B9CD7CE1ECE237CA" ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB9FABEF967F194830C3B36869C39E2B38A02F943630233E2CD45E608A3" ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" eshwffymrd.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B02047E639E852CDB9D53293D7CB" ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF9FC8D485C8569903CD62F7E94BD95E1475937674F623FD79C" ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" eshwffymrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" eshwffymrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7836BC4FE6A21AED179D0A88A089011" ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf eshwffymrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" eshwffymrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs eshwffymrd.exe Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4876 WINWORD.EXE 4876 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 3328 gzhjswfm.exe 1068 ljjmglgjumkzsvi.exe 1068 ljjmglgjumkzsvi.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 3724 eshwffymrd.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 1068 ljjmglgjumkzsvi.exe 3328 gzhjswfm.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 640 hzeatxqglihqh.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe 1296 gzhjswfm.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4876 WINWORD.EXE 4876 WINWORD.EXE 4876 WINWORD.EXE 4876 WINWORD.EXE 4876 WINWORD.EXE 4876 WINWORD.EXE 4876 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 692 wrote to memory of 3724 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 84 PID 692 wrote to memory of 3724 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 84 PID 692 wrote to memory of 3724 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 84 PID 692 wrote to memory of 1068 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 85 PID 692 wrote to memory of 1068 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 85 PID 692 wrote to memory of 1068 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 85 PID 692 wrote to memory of 3328 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 86 PID 692 wrote to memory of 3328 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 86 PID 692 wrote to memory of 3328 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 86 PID 692 wrote to memory of 640 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 87 PID 692 wrote to memory of 640 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 87 PID 692 wrote to memory of 640 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 87 PID 3724 wrote to memory of 1296 3724 eshwffymrd.exe 88 PID 3724 wrote to memory of 1296 3724 eshwffymrd.exe 88 PID 3724 wrote to memory of 1296 3724 eshwffymrd.exe 88 PID 692 wrote to memory of 4876 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 89 PID 692 wrote to memory of 4876 692 ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\eshwffymrd.exeeshwffymrd.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\gzhjswfm.exeC:\Windows\system32\gzhjswfm.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1296
-
-
-
C:\Windows\SysWOW64\ljjmglgjumkzsvi.exeljjmglgjumkzsvi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1068
-
-
C:\Windows\SysWOW64\gzhjswfm.exegzhjswfm.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3328
-
-
C:\Windows\SysWOW64\hzeatxqglihqh.exehzeatxqglihqh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:640
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD59a987907f921217b0b299b388e36ba0d
SHA125ae91fcdee4d85555478cb6f4a16f002984d634
SHA256d9c32be1f84736aef07fb9464d63877068a205c0428dfd5a87d21c8d0acfc37c
SHA51269ddfb5f24da5652d8d39218245867ae949b6a147afbf6ae57d24767316470ce12becbfc81d2d85d708f530c9d1fb45b965a95997615e7c5bb2a7fb4c86ee0ec
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
462B
MD500dc8657095f36b868e339bfb0c206a5
SHA18982865e58287ab08538425196e19092eb1477d7
SHA256d26d501903584d61eb74fb23f5407239c41edabe3adacfaff8698d0b27d533e8
SHA51261c56f7dcd7d87d7ebae6a26c06a90366c68df14bb60493f9cd5d1b796c0e1cd561b7015357289d9daeb2733cb90a017d76e1fb8b2fd8ee0b722704be60bcf06
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5cfd60e5fec5b67d657b67e34ae6bf0bc
SHA1987c7b3cfb05cfc6f50b50eb5f84a5fbd662ab69
SHA2569e8fab3fb91a6dbb3682cb2bc043bb325829415ba1bbf1cb3cd64574ff610593
SHA51231d13fa404529bfb713b2afe71358db1f76be336cfc94f08eb15270e5d2a0e63a296d69e19426ee3739edaeb5b543b9127e653f615e10b9c21243b04cfb699e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5805bd8ac3ac548a4c8b9b82e0fd49dad
SHA151d79436a0dd15a098323a9d7f30c201c5716566
SHA256238d3f4557247a7e06c8af1fb3704973f40870ba19215eb457fdbdc7acb8c61e
SHA512f3e4622f0e0abc66ec87fe0fb5cfda36c5af255f87d9dbd1d86ac6eb3571af2ee8cbf8522c602eb166814e0b0910aaa860c07d24eba0b7764852d863b9f3ee0f
-
Filesize
512KB
MD55292af7d12e46beb0bfec8fcdf75fded
SHA1d954ddeff77648b8af2a68c3338c92a1ab3d24e9
SHA2569d17eae2cc14922577b55965d681a76f5e07aadaf41a3c53536718fae3af484f
SHA512d868eed82c99f43a9d740e06e2c8de320645b3c7e024fa89aa83c7e4f1728b460bdff1643729314ce3382e794f9551da05b5590dcfd32465f8d77b8f5814ef54
-
Filesize
512KB
MD5373fd32eed31a63016dc083cba767241
SHA1796c8bd56fd9c7f90dc78bac32eacab636054f98
SHA25604e929f1e225a938ab98c8ef6edb5bd81ef964901e7a98611fa8e1a893491356
SHA512c90ad1dd7f66317272f7dfec5a4999da4cc9848a35d3a800fd830157b510f2a9a00da22b9f0818e1190fe4c509fa288c7d8c6a6e83d8c6ca75e933c2473c8957
-
Filesize
512KB
MD5771cec9762661ac0fbb08d8136596b4d
SHA1a87451e4d6d7103ca43c607aa7253348f889f73c
SHA25658b45455f6481949ea4391fd7e8ad07b5d32569343b7424b7c444a36c2f04760
SHA51255017c8ee1bf8513cf261bcb37ac784156c1dbbe9aa115ceee86f74774f26ebdb7fb48b9146812f0454ca7208c898cd84605e5030cd361c6d423c88664178c1e
-
Filesize
512KB
MD56d7250314060c68c2a53d845ffa2c335
SHA1c295ab59721b9f98e96bb07a72fe3d2855045f90
SHA256d709041b61555d68f6a8fda6713b9e3bfe23e53f340ae8a19aa716d592e1e5c6
SHA512b7b54a22fe7e40eb89777b62453242a405ee6f2cb55615b2672b53230d20e1a682529421686325359bb968a272ab2393f4ec5ca28795a6eafcef255b8064e283
-
Filesize
512KB
MD56c8c603823c75e629e575a85041e38c5
SHA1baefb4707b23ed51b87c0eb6ee13ae043fdbd8b8
SHA256bec1d1deb06e23a36260ebd1aed0e7fdbda722cb23b265d83a56d1dc14d0f1a8
SHA512b0fcb0fe1b8df5bd09d2671cd760810b8a0dcb3cf73476877054a573808c2fe0f41a57acb34dba9911d348b7ee1f379ec881ac40c0a01f9433c3b45cdef8d56d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5c03561b70e874ccc4e21ce7b1d7f850c
SHA18baf9a734f5d78569cc1caced2d8e27602c989ba
SHA2561179acd8726244b40af047607ce4b4c343bc1e80627292237fff59bca21aa13c
SHA51200d627cd3e3e0e73788f1054f736262e7f106b4dde4af69b7dddae18f853ba77d77f6f49c65ddbd410c98ca06e29ac2ebc46c8b018bc0496287858a2d15c24f6
-
Filesize
512KB
MD56171a7eda8beff8a9b55b40a416c1181
SHA1430641013bcc1ed3be82a6fe3fd00c836e5c56df
SHA256b589a95c6cfad217b53afd0a2fe6b7121534c08e2d2e1abe55e1d9b37194919c
SHA512b451ec66b663811b5d1b2e669673c75859be1ec09fee8c9a6087a0b5eca9a54456226ed8d606cb23822f15d13c32988d28f6d4871446844bff954cb1956e8b6b