Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 12:26

General

  • Target

    ed954ed4772590e21477fed8d7430984_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ed954ed4772590e21477fed8d7430984

  • SHA1

    93021b6d923609738951745d7596f0b43569eeb2

  • SHA256

    498a7f9e73fbeab214dd89907c272112d605d34afa7515075241536db6db1814

  • SHA512

    0298560109e22f4d6e4e096033945091246d909859c595043ebd3d4ad27b2a1ea79e8170049b57cb74b496dc90fbc56bda2ccf3ffe3f5abdc54b7da954215256

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6x:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed954ed4772590e21477fed8d7430984_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed954ed4772590e21477fed8d7430984_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Windows\SysWOW64\rojelmiydk.exe
      rojelmiydk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\SysWOW64\ujrkmbyo.exe
        C:\Windows\system32\ujrkmbyo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2856
    • C:\Windows\SysWOW64\cgswgeaeipcwzss.exe
      cgswgeaeipcwzss.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3924
    • C:\Windows\SysWOW64\ujrkmbyo.exe
      ujrkmbyo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3528
    • C:\Windows\SysWOW64\uasrnppzoibel.exe
      uasrnppzoibel.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2700
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    8353291d4d26e07c9453aa2a9428e546

    SHA1

    f303d60fc15e1e6d4fc3d143240982a5e179dd5b

    SHA256

    64645650d95bcfa9e800438c7d731ba7db989569552c781fc8cb8fb12e268df3

    SHA512

    e5679c00c74295c9cd3ee808adf9fd3337c5fea40454f95a80c8291435e1d1a1b5cf68d07600aa1a5f0e0784e2b465801b410c8a74c08dbcd4edef480b853cdc

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    def2fb7f751e058d9c4c0630c55a0348

    SHA1

    88961b5dbd4703df70a239c0980f97e86400bc9a

    SHA256

    75e4eaa1c042a8667143400da8dbc0c4d96e4c885ee5eb5c90c95bfe631a3539

    SHA512

    c56e8ba2dc610a1692a30f6f981c65561b7b5ebea495148eebb6d8b689df2266ebe43efd0b6eeaff0a3c6c4562da40cd16c86c720616d0072857c3286cee39fa

  • C:\Users\Admin\AppData\Local\Temp\TCD1D.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    402B

    MD5

    1589eeb305de4e0850cc87234e336286

    SHA1

    1fff846098cb122d5f56e4207ece20d311be9d47

    SHA256

    f7c41a0abed32be07a19b1ef1446c0a30fc7242b6751714ca498bf979807c188

    SHA512

    5faa1e64da733acb112e72e44e734f032aa7b42362d8f1531794cd5d30159c9c977f9ea5674a62b1153dca4e8ecbd928ae86f0a21f40f7eb9ecddfebffff4af2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4211cc014b21b4b9d4979b3e78695055

    SHA1

    40a7e83cfbefddbbf5ca64b2666be454878ab9dd

    SHA256

    8f9195b3953105256e636dcf517d01dc54afdfc68f5d0747fa110c296038c117

    SHA512

    f76c32650ac4766ed253bf26b7abb370a2a5b1c2f16ed65d72be00ee1244530aecf6b6d878fbd9fcb24c87f4d5ccd5b90eb785b5efc976d45bc00dce04249ceb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ce50d3f91ced83802b559a5aa460a82e

    SHA1

    d358f6931875acc9d697b8986887ce211af483a8

    SHA256

    2aa3cc164606f3499d7c8f732101ff05f6975d31dbcf9133b1d4d2b4d3579752

    SHA512

    6a3e244dfdd39d99e0bf584009357e06c7b376a4a7950a2d2edc96a3e7585662111864218883db4ab3b85d84f8e148bc90fc893075551a9b8f8244c2ce193a6a

  • C:\Windows\SysWOW64\cgswgeaeipcwzss.exe

    Filesize

    512KB

    MD5

    c4442eece3a4e798b14fb0f4d56cd001

    SHA1

    919c36922a0acba27ac257ac8dfe3411338d1d2a

    SHA256

    0201c164e0f4a26793c7b6b5ad89fd43fa7e3e06e1c2abe4f667dec54e8e510d

    SHA512

    b2b5da7fbd317f4b90db8f8c557b6b875fb426bb26c605dfa6b97bfd053f8eceb95c70d8b8239c1ff882bc0a970e2f2c7c5e44dee12aa89bbaedcc5d5da0e008

  • C:\Windows\SysWOW64\rojelmiydk.exe

    Filesize

    512KB

    MD5

    d9cde116a30658a2c03aad13e05cda20

    SHA1

    f5f35c632134875a1dc377adea39e5ab156222ed

    SHA256

    8f678093c656c5b377f68bb3d2a62edf5e2d014769690e4acd91431e51f25502

    SHA512

    54e8e95a7157cdcd1059ddb7f170d26a562a37d8e1606121c86f663bf30b55506ef575dccecae7ebe6e2c9a0a5205a1b152e4f107686fbe5dd3a5035d1716358

  • C:\Windows\SysWOW64\uasrnppzoibel.exe

    Filesize

    512KB

    MD5

    fb9765731098886662246fda900b0fc7

    SHA1

    2265a5c13645fd43e7d5d6c62f3975c096c80c4b

    SHA256

    0581a20d74678e78835171a505e4251e938b8b04ee766559d4d58fbcacbcd80b

    SHA512

    318d49a79530024004ab68b5418bd5be58abc86a164d2f8bbd435e9bde92587030abdeaf6fe228f694da2ef7e61da0b20b4322f3c3dd990bf31f4fc44fbf6d22

  • C:\Windows\SysWOW64\ujrkmbyo.exe

    Filesize

    512KB

    MD5

    218e20009b6391d237dc136b4cb11252

    SHA1

    38e210a56103abae9ab09c3eb137de50bcb8e5e8

    SHA256

    61b3b9fff530329881085502d80c0fb9cbd6dce41fd7702a3aef82a64561e013

    SHA512

    c61a86df1e87cb37088b354814ae5f0f1e497f31c227e82fce1f4a76b7ad86d2258dd61bdd621e0634736bf524537f9feb20b865d7b3f497fd7ba0744b8da7ff

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    30a6d512bfd66b092f9b1f111eb48ee9

    SHA1

    d51a22c242c14bf6675ae23fbae5a6c3687979d7

    SHA256

    d61a9a84b4446f52fd7edf5c74e0a2d98814131e0de320d3b49755edce61698f

    SHA512

    172c8decc0da31976441dc2ef93e7b0fb8057c8b10ba690fea9b332d6748cbaf8977f76d3db583c06bd3e55877fba36577b3ea7ee4eea059dd25dc160c0f37f9

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    3d20793ab33bb99d49f1f9b3181ef95a

    SHA1

    412932280ac678b5a77efaaf68e51eff01f9d4f3

    SHA256

    d71f76ea6b3e3cd7b1b2ae8c8af391222799a5bf8df31195035428ec99a037d9

    SHA512

    727d92bd9fabc4255b0fa0d9951f9393c52b6fa1a5a99ef3b90ca198ba0cbb938ab75d665abf021e21355d3f822e2fee3ec4ab915acf6cf8475f3a6c044afee2

  • memory/1644-245-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-41-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-37-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-40-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-42-0x00007FFA17600000-0x00007FFA17610000-memory.dmp

    Filesize

    64KB

  • memory/1644-38-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-39-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-43-0x00007FFA17600000-0x00007FFA17610000-memory.dmp

    Filesize

    64KB

  • memory/1644-248-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-246-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/1644-247-0x00007FFA19A10000-0x00007FFA19A20000-memory.dmp

    Filesize

    64KB

  • memory/4964-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB