Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 07:54

General

  • Target

    ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ed254ea31781627675347fa45354dd1b

  • SHA1

    eec3e7cca8a07cfece6b1e53614d6cc965580629

  • SHA256

    1e0c8b666e9a71c2272d7265be04a8b12aa76517ba4d1536feeaf9f4fbf43211

  • SHA512

    73b2b0c2824442fbd3c62447a33fc539efcd495a62b9679ec457d50aae401a0446adfd4909e47f2cf116dc8e949e88501a3ff74ca7ff11fd43ece3e45e026fad

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5M

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed254ea31781627675347fa45354dd1b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Windows\SysWOW64\eshwffymrd.exe
      eshwffymrd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Windows\SysWOW64\gzhjswfm.exe
        C:\Windows\system32\gzhjswfm.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1296
    • C:\Windows\SysWOW64\ljjmglgjumkzsvi.exe
      ljjmglgjumkzsvi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1068
    • C:\Windows\SysWOW64\gzhjswfm.exe
      gzhjswfm.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3328
    • C:\Windows\SysWOW64\hzeatxqglihqh.exe
      hzeatxqglihqh.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:640
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    9a987907f921217b0b299b388e36ba0d

    SHA1

    25ae91fcdee4d85555478cb6f4a16f002984d634

    SHA256

    d9c32be1f84736aef07fb9464d63877068a205c0428dfd5a87d21c8d0acfc37c

    SHA512

    69ddfb5f24da5652d8d39218245867ae949b6a147afbf6ae57d24767316470ce12becbfc81d2d85d708f530c9d1fb45b965a95997615e7c5bb2a7fb4c86ee0ec

  • C:\Users\Admin\AppData\Local\Temp\TCDF0E0.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    462B

    MD5

    00dc8657095f36b868e339bfb0c206a5

    SHA1

    8982865e58287ab08538425196e19092eb1477d7

    SHA256

    d26d501903584d61eb74fb23f5407239c41edabe3adacfaff8698d0b27d533e8

    SHA512

    61c56f7dcd7d87d7ebae6a26c06a90366c68df14bb60493f9cd5d1b796c0e1cd561b7015357289d9daeb2733cb90a017d76e1fb8b2fd8ee0b722704be60bcf06

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    cfd60e5fec5b67d657b67e34ae6bf0bc

    SHA1

    987c7b3cfb05cfc6f50b50eb5f84a5fbd662ab69

    SHA256

    9e8fab3fb91a6dbb3682cb2bc043bb325829415ba1bbf1cb3cd64574ff610593

    SHA512

    31d13fa404529bfb713b2afe71358db1f76be336cfc94f08eb15270e5d2a0e63a296d69e19426ee3739edaeb5b543b9127e653f615e10b9c21243b04cfb699e0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    805bd8ac3ac548a4c8b9b82e0fd49dad

    SHA1

    51d79436a0dd15a098323a9d7f30c201c5716566

    SHA256

    238d3f4557247a7e06c8af1fb3704973f40870ba19215eb457fdbdc7acb8c61e

    SHA512

    f3e4622f0e0abc66ec87fe0fb5cfda36c5af255f87d9dbd1d86ac6eb3571af2ee8cbf8522c602eb166814e0b0910aaa860c07d24eba0b7764852d863b9f3ee0f

  • C:\Users\Admin\Documents\EnterShow.doc.exe

    Filesize

    512KB

    MD5

    5292af7d12e46beb0bfec8fcdf75fded

    SHA1

    d954ddeff77648b8af2a68c3338c92a1ab3d24e9

    SHA256

    9d17eae2cc14922577b55965d681a76f5e07aadaf41a3c53536718fae3af484f

    SHA512

    d868eed82c99f43a9d740e06e2c8de320645b3c7e024fa89aa83c7e4f1728b460bdff1643729314ce3382e794f9551da05b5590dcfd32465f8d77b8f5814ef54

  • C:\Windows\SysWOW64\eshwffymrd.exe

    Filesize

    512KB

    MD5

    373fd32eed31a63016dc083cba767241

    SHA1

    796c8bd56fd9c7f90dc78bac32eacab636054f98

    SHA256

    04e929f1e225a938ab98c8ef6edb5bd81ef964901e7a98611fa8e1a893491356

    SHA512

    c90ad1dd7f66317272f7dfec5a4999da4cc9848a35d3a800fd830157b510f2a9a00da22b9f0818e1190fe4c509fa288c7d8c6a6e83d8c6ca75e933c2473c8957

  • C:\Windows\SysWOW64\gzhjswfm.exe

    Filesize

    512KB

    MD5

    771cec9762661ac0fbb08d8136596b4d

    SHA1

    a87451e4d6d7103ca43c607aa7253348f889f73c

    SHA256

    58b45455f6481949ea4391fd7e8ad07b5d32569343b7424b7c444a36c2f04760

    SHA512

    55017c8ee1bf8513cf261bcb37ac784156c1dbbe9aa115ceee86f74774f26ebdb7fb48b9146812f0454ca7208c898cd84605e5030cd361c6d423c88664178c1e

  • C:\Windows\SysWOW64\hzeatxqglihqh.exe

    Filesize

    512KB

    MD5

    6d7250314060c68c2a53d845ffa2c335

    SHA1

    c295ab59721b9f98e96bb07a72fe3d2855045f90

    SHA256

    d709041b61555d68f6a8fda6713b9e3bfe23e53f340ae8a19aa716d592e1e5c6

    SHA512

    b7b54a22fe7e40eb89777b62453242a405ee6f2cb55615b2672b53230d20e1a682529421686325359bb968a272ab2393f4ec5ca28795a6eafcef255b8064e283

  • C:\Windows\SysWOW64\ljjmglgjumkzsvi.exe

    Filesize

    512KB

    MD5

    6c8c603823c75e629e575a85041e38c5

    SHA1

    baefb4707b23ed51b87c0eb6ee13ae043fdbd8b8

    SHA256

    bec1d1deb06e23a36260ebd1aed0e7fdbda722cb23b265d83a56d1dc14d0f1a8

    SHA512

    b0fcb0fe1b8df5bd09d2671cd760810b8a0dcb3cf73476877054a573808c2fe0f41a57acb34dba9911d348b7ee1f379ec881ac40c0a01f9433c3b45cdef8d56d

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    c03561b70e874ccc4e21ce7b1d7f850c

    SHA1

    8baf9a734f5d78569cc1caced2d8e27602c989ba

    SHA256

    1179acd8726244b40af047607ce4b4c343bc1e80627292237fff59bca21aa13c

    SHA512

    00d627cd3e3e0e73788f1054f736262e7f106b4dde4af69b7dddae18f853ba77d77f6f49c65ddbd410c98ca06e29ac2ebc46c8b018bc0496287858a2d15c24f6

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6171a7eda8beff8a9b55b40a416c1181

    SHA1

    430641013bcc1ed3be82a6fe3fd00c836e5c56df

    SHA256

    b589a95c6cfad217b53afd0a2fe6b7121534c08e2d2e1abe55e1d9b37194919c

    SHA512

    b451ec66b663811b5d1b2e669673c75859be1ec09fee8c9a6087a0b5eca9a54456226ed8d606cb23822f15d13c32988d28f6d4871446844bff954cb1956e8b6b

  • memory/692-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4876-41-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-40-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-39-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-37-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-38-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-43-0x00007FF9B8320000-0x00007FF9B8330000-memory.dmp

    Filesize

    64KB

  • memory/4876-42-0x00007FF9B8320000-0x00007FF9B8330000-memory.dmp

    Filesize

    64KB

  • memory/4876-262-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-263-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-264-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB

  • memory/4876-265-0x00007FF9BA890000-0x00007FF9BA8A0000-memory.dmp

    Filesize

    64KB