Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 10:05

General

  • Target

    ed5be467fe9b39c8cfd60794a1803589_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ed5be467fe9b39c8cfd60794a1803589

  • SHA1

    d2270031b8aeb622ef8bb5fc9f9b452e927d51f1

  • SHA256

    ca3a2601643725cbf673a87574f41b5114bbbb03928d7489627f5de9da93caba

  • SHA512

    941c498af7c2a660df27c6eb65507ec7cc03b231b35dc618d6ad238136da31053b44faeb3dd98a1dfdb87098abac022bf62eef9b740f966e8d9602e2986901c6

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5i

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed5be467fe9b39c8cfd60794a1803589_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed5be467fe9b39c8cfd60794a1803589_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\leyhdtuvsm.exe
      leyhdtuvsm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\SysWOW64\zhippatw.exe
        C:\Windows\system32\zhippatw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1224
    • C:\Windows\SysWOW64\sqsaiqbvjwlouty.exe
      sqsaiqbvjwlouty.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:564
    • C:\Windows\SysWOW64\zhippatw.exe
      zhippatw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3804
    • C:\Windows\SysWOW64\pkxdcknujfjxi.exe
      pkxdcknujfjxi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2660
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    2cf3e07e892e6879163953e1d404b246

    SHA1

    c88e0822af23480f201ccf55acb8768412a8effc

    SHA256

    d7b3f97f88f967d8c708872557463705d2b47804a08e316e5e48a4c49f53c5b9

    SHA512

    2caa5835ff55084fb96ac273756061e84f0c0054c44f6cdea161f8287730d1c8aede65769f74ee25b0038d66324a20bca868db36440ad9393ee97b24ada4ac36

  • C:\Users\Admin\AppData\Local\Temp\TCDE931.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    429B

    MD5

    1faee55f5ada10257ca28d073359d14b

    SHA1

    67022b6c7ceec04850fea1f45dad701208ebad56

    SHA256

    017b176136ba2be8fbd4e14924b01dab0d6f0c3c7af76e772af5275963dd4831

    SHA512

    840593b8a9f78dbfe71e0a560a422787f2868d613af3a9d16ae22953842400189da4c1184eaafea53c3a0a66eef461f96f18d517948f1f3f6014957354ec2b07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    4KB

    MD5

    35bdb1aba116836fbb0469f9905ee3bf

    SHA1

    8bf97c76d08ebb2b8971564e027b168881d8a73b

    SHA256

    e25097bd8814bfd54d413c89f435efe19fc60fafdad2bd2360e25fb6bd4b548b

    SHA512

    f973fe93fe03531e5b308623dd11c3cfa6c73af33d99004543e624ead38f9f986184868ad3dd08b4abee6faddd495797da1f4e9e38e49f4c4bd036e976f70db7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    5KB

    MD5

    b0884d270f44cb4016ff444441f7ccd0

    SHA1

    3752e8a25eb9bfe359af5b17ccf5b867cef4bb75

    SHA256

    987f0bb4fca2b9b67732c4780b30e1a352b656513b5bbfdb33133b59173890e3

    SHA512

    fffc280027efa762a9c8250857cf027a8f6eb646bfffa68b28f6b28ec4590b0f1e912a0e8b5fa91816a34ab35498f54f0e987f4db9bb18f44cf462312c551929

  • C:\Users\Admin\Documents\CopyOut.doc.exe

    Filesize

    512KB

    MD5

    a7c6cd23ed3d2cb2c94274e3c605e6a4

    SHA1

    a9cdc4940c991335240af6f594b7c791d123afef

    SHA256

    e5f85a6f2327b1f3557c7a5a2af026900b819a2c1d5c600bb9d63df026e42488

    SHA512

    6d2e4ab27dd9525ab1f7d761bc38032a8070db6b5af6b87ec39829be184f47c55c2cdce582e94d62447cbcf9322fea884bee6bfa92f00a718a46b34962ec03aa

  • C:\Users\Admin\Music\InstallConvertTo.doc.exe

    Filesize

    512KB

    MD5

    a52864fc28952cb2a50a39ac1d15d3cf

    SHA1

    d0e0bc6f45a98926cec6d17b9dd895335b1d97e7

    SHA256

    562282b06050ecb5cf9bc0b355573c2fe1daecda831591ab44d133ca3185a8bd

    SHA512

    b2928f7ba212a7824eba7b8b5d8f47dd28b54f598f06300883fe93193f505259af642b1276ef2f22329f3bc36d8ea8c9767b673b82d7944c9e3ea6c884df3af1

  • C:\Windows\SysWOW64\leyhdtuvsm.exe

    Filesize

    512KB

    MD5

    68e9768fa8a380f3be9ab61d94af97ce

    SHA1

    714aa4d30894c4acfcc568b5aef6d0b820534ec3

    SHA256

    7696e0f340d139932d888db21007e50800175cc0004ecbac822379fdb2e129f4

    SHA512

    42ad4ce6d5d556a90343a8dc2c067b250ffc5d3d292e0246447b335e618a9f33cd70d7014c941481d7eec9b53621432bb676eef9b22a257379dcac97d58fe485

  • C:\Windows\SysWOW64\pkxdcknujfjxi.exe

    Filesize

    512KB

    MD5

    3fdd82cc243d8187d2a953ef5793380d

    SHA1

    6ba614b88dba5e8be0277bf80030ae476a2e1f09

    SHA256

    5e9d05fb3eac27e7affb29aebffa381b27bec29847b4c9d5287c4f7009ec66f3

    SHA512

    9f4590798d1d09dc25d7735913a639b8a9c64b4e9839a7bfb765a1b1008d7ef781c49d33f6a50b4a2affa5ce402f95e870fb6f9fe57f2b8020eb604f374e92e9

  • C:\Windows\SysWOW64\sqsaiqbvjwlouty.exe

    Filesize

    512KB

    MD5

    937f6330cab8dcd696d117cd65e38e51

    SHA1

    88b62e4ac2ed588a316349b50c5a7d0aaa50b180

    SHA256

    b2dc8212216b1609b88e54b2087ba7bc38fc6d7be96cc5b4e37f655e584414a2

    SHA512

    22f950b77255c1c4cfd18a6de3d961a7c73cac8f45501ecc67d9dadec05644b5a2a25036af49cca670ec52eb7e0a1d7d36b0014aa44ae532a40953d9a9a658a9

  • C:\Windows\SysWOW64\zhippatw.exe

    Filesize

    512KB

    MD5

    b57700b6d63ee861da4c1537e4efa1ed

    SHA1

    9b5349a425389485e212e1a668ccd55a4c805dd8

    SHA256

    a882a4c5e845689f4964da1349cfe0e005fc14ff373751abdbabf2fb9aaac360

    SHA512

    c3b075b78d42cc086b68562087f70581ef93d8ef6940a5ea70f3fe10d7a4a613c3b7b3ac5cf29aa5dcbf01b35821357cb6b730e4e02ea026ca4d85e7b37b5331

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    17B

    MD5

    c8fec35deab8cb9d9f4f57ab53a3acd7

    SHA1

    7161fe78ffe13ee6d311a8640823d06af3849770

    SHA256

    b9ed0cc04133b77b78cdc4f81379ca4cd49aa579c5b68c28227941d4cd1f878b

    SHA512

    e542113c4f230cb279c4bc7df27cf55bae436c1f55bfa3d68d88fe2275e5a186412b070d4bd7c1d4f54f0cd16dcc1c0fdb2b185b27a9c068565b13459659fbc2

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    f72a06a7e88f6f8acbeffb041e9af837

    SHA1

    9409b6467607b18c9709502f0294b0c7e909ff82

    SHA256

    da83ba47e9c3a1b5a8ff85fe85a20708fa810bd2269f3adfefe0f1fd1904e85b

    SHA512

    cc1f6aef573a7eab0aac31eea15fbe3f18eea884a15cd3cab2f6d70d83981e1d0b69e004f424078bce5f47a1eb979c7dfb10fafe510266c88edad35c4732a870

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    ca8d5a84b6356fac0e27cf89e2a88735

    SHA1

    9a586df523490620e98d7088b5f9e3f8c040228e

    SHA256

    51246adaafd3a89a1327ced53ac866b2bc1661001cb3e069bc85f90fde36a1cc

    SHA512

    9b68a52ac12f0039f8a9f64e0446703c4a80ac7f6cd893e2911bc4bb66b13d6491bae6619e8d358615df1c9cc079aa873512b4ca253284ab355de9cb143c3602

  • memory/1116-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4688-42-0x00007FFBA2CB0000-0x00007FFBA2CC0000-memory.dmp

    Filesize

    64KB

  • memory/4688-40-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-38-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-39-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-41-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-43-0x00007FFBA2CB0000-0x00007FFBA2CC0000-memory.dmp

    Filesize

    64KB

  • memory/4688-37-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-256-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-257-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-259-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB

  • memory/4688-258-0x00007FFBA4D10000-0x00007FFBA4D20000-memory.dmp

    Filesize

    64KB