Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 12:26

General

  • Target

    ed954ed4772590e21477fed8d7430984_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ed954ed4772590e21477fed8d7430984

  • SHA1

    93021b6d923609738951745d7596f0b43569eeb2

  • SHA256

    498a7f9e73fbeab214dd89907c272112d605d34afa7515075241536db6db1814

  • SHA512

    0298560109e22f4d6e4e096033945091246d909859c595043ebd3d4ad27b2a1ea79e8170049b57cb74b496dc90fbc56bda2ccf3ffe3f5abdc54b7da954215256

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6x:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed954ed4772590e21477fed8d7430984_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed954ed4772590e21477fed8d7430984_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Windows\SysWOW64\zxmgwssyyb.exe
      zxmgwssyyb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Windows\SysWOW64\tklvlvsw.exe
        C:\Windows\system32\tklvlvsw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2196
    • C:\Windows\SysWOW64\siuwxrqkqskzzva.exe
      siuwxrqkqskzzva.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2228
    • C:\Windows\SysWOW64\tklvlvsw.exe
      tklvlvsw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2696
    • C:\Windows\SysWOW64\gwmfarzlfmxoz.exe
      gwmfarzlfmxoz.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2840
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      5db4d3001cc3195b53eb71e1766a6009

      SHA1

      d92f012e97277dbb73312e5f3e03e109d458b79c

      SHA256

      722e4ccc2b81278144d0a93827671438588ac7c678e32eaea9f478e987eefea2

      SHA512

      12db4b5a1be9f1989e474f024af97bed8d7afb9d2a36c0996c478406bcf1e48fb74ccaae66b32d4cadc07bff8d0c9d748a909461887fca6beb45d8b5fd2b1804

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      1257e4aac6d36a8b7dc929a814d649b2

      SHA1

      956b2cc02ad63023f478a26d413acea67e920964

      SHA256

      7d6a2fb905608e4db03e4f9501cb3ce5f4e9abcd43152e5faff24ccb67a310e2

      SHA512

      39c2234aa6ffd22f668e3771aa1dddded23a742bf8121ac575aeae967b40ca2e91a19be9a53894e9e2f890dc5c9ac8af1e85935790c0bb787021664e7355d546

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      5f57c9caf36644a32fd84367836b0bf3

      SHA1

      1ffeebd0a5575470dc0695b13672465b29f24f59

      SHA256

      07a414f62f6971e1dc2a4786f78427d1413c5c93cff2cb392c85325897b9f31d

      SHA512

      62b1e8beec5d4b11f0f283b042a2be34624310a63887a782910fea722acff865acf23e656ff314e132a7cf8c1c36abb8df9beeeff076e6e84680930e25cf3e22

    • C:\Windows\SysWOW64\siuwxrqkqskzzva.exe

      Filesize

      512KB

      MD5

      4add51b81887d83cf0af579d8bcb5ce7

      SHA1

      5a852ebd39b2fc7b90954a55c6e1c10304519238

      SHA256

      70ac5e2d3bb1c6be85442330e6129964f29aa44699ac561390daae5b9beb9bbf

      SHA512

      ddd47ed4015a1baeb1460f608210b2e87716fff02f4e33b8b696f3dc838d0095207e1b4e35ea7ec456de15bf6b06301e9a4efd0455e7bdfa02e11ec2eb7846fd

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\gwmfarzlfmxoz.exe

      Filesize

      512KB

      MD5

      8112843a41cb1234789ff5d9eaf548ff

      SHA1

      cf86c3aa5ecd2d461df5b2e294a00fb45e21b0f4

      SHA256

      00fa8406584f9cf814237f68c51f249b1ba03cacc806b6800e0faffd3803f023

      SHA512

      858dcfd7fc2bc680f128790ac960fcafa8e7c5479bcc2a08fe9e757e89e45aecab4c00e6b81f7cbfb77f468e89a8c99db39edcfa423dc2c23cc436226ff6f59d

    • \Windows\SysWOW64\tklvlvsw.exe

      Filesize

      512KB

      MD5

      2d93866efcf5f731da62335ab11bbb37

      SHA1

      32403311e204801c595566b33b8b25759b2b72e9

      SHA256

      dd0485f9fc2e4bb0918902cf709165fc63a34d108871bfdd2189fd5505a0bfdc

      SHA512

      1c378e8878967a7d2873ce6a976368948fa0858f5b6fe4da2cb8367ba05bdebcf9d2ceff1ac40f59c51ac8e13321f1d3517b08c9f09935b6195f15e8c789e6da

    • \Windows\SysWOW64\zxmgwssyyb.exe

      Filesize

      512KB

      MD5

      736b75594e4054ef67eb3bf2e70770c6

      SHA1

      eed75beb65a59f25c767910ebd5f3754c59ca64f

      SHA256

      ee038d8dbbc1401e70a18c09ffa1c7a96d27821a2492c3a8901afc8b60686e85

      SHA512

      a66e28ac44dddd5b53fae525498bdbfe4b416360f63f9eb1d916db268d08dd0a13c282abb7ab2e10283f20c81c937963633e992e4409972114f5893362c3c97f

    • memory/828-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2748-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2748-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB