Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe
-
Size
512KB
-
MD5
edacafbdc34678350a21dfc0d5ed812b
-
SHA1
fb5851ca7dd596c2a6db92bfbe2a286f31c5b856
-
SHA256
b7883472cbd2ecc4eedea2fcec7acf42c75b1fa581d20e2ad7665ec95e2eed21
-
SHA512
442aa2d8c9ce66c1963d66a8c5035ea84d78e24e4f5eb38ea6f7621ebcb5effa75ca979191a4983fc14f727c1916ca82c6a645d2e40d3002c7effb17cbb2d073
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6X:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5u
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" yxkurhjqga.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yxkurhjqga.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yxkurhjqga.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yxkurhjqga.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 908 yxkurhjqga.exe 4444 rjbtwdbvwdargwm.exe 220 zgvuzuuz.exe 3932 uxqboywvtkowu.exe 3940 zgvuzuuz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yxkurhjqga.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oaixiidm = "rjbtwdbvwdargwm.exe" rjbtwdbvwdargwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "uxqboywvtkowu.exe" rjbtwdbvwdargwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rrlvihoo = "yxkurhjqga.exe" rjbtwdbvwdargwm.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: yxkurhjqga.exe File opened (read-only) \??\u: yxkurhjqga.exe File opened (read-only) \??\o: zgvuzuuz.exe File opened (read-only) \??\g: zgvuzuuz.exe File opened (read-only) \??\i: zgvuzuuz.exe File opened (read-only) \??\t: zgvuzuuz.exe File opened (read-only) \??\o: yxkurhjqga.exe File opened (read-only) \??\v: yxkurhjqga.exe File opened (read-only) \??\v: zgvuzuuz.exe File opened (read-only) \??\x: zgvuzuuz.exe File opened (read-only) \??\z: zgvuzuuz.exe File opened (read-only) \??\b: zgvuzuuz.exe File opened (read-only) \??\s: yxkurhjqga.exe File opened (read-only) \??\n: zgvuzuuz.exe File opened (read-only) \??\r: zgvuzuuz.exe File opened (read-only) \??\x: zgvuzuuz.exe File opened (read-only) \??\a: yxkurhjqga.exe File opened (read-only) \??\h: yxkurhjqga.exe File opened (read-only) \??\p: yxkurhjqga.exe File opened (read-only) \??\k: zgvuzuuz.exe File opened (read-only) \??\e: yxkurhjqga.exe File opened (read-only) \??\l: yxkurhjqga.exe File opened (read-only) \??\q: zgvuzuuz.exe File opened (read-only) \??\l: zgvuzuuz.exe File opened (read-only) \??\j: zgvuzuuz.exe File opened (read-only) \??\i: zgvuzuuz.exe File opened (read-only) \??\w: zgvuzuuz.exe File opened (read-only) \??\l: zgvuzuuz.exe File opened (read-only) \??\a: zgvuzuuz.exe File opened (read-only) \??\o: zgvuzuuz.exe File opened (read-only) \??\s: zgvuzuuz.exe File opened (read-only) \??\z: zgvuzuuz.exe File opened (read-only) \??\w: yxkurhjqga.exe File opened (read-only) \??\b: zgvuzuuz.exe File opened (read-only) \??\e: zgvuzuuz.exe File opened (read-only) \??\h: zgvuzuuz.exe File opened (read-only) \??\m: zgvuzuuz.exe File opened (read-only) \??\y: yxkurhjqga.exe File opened (read-only) \??\a: zgvuzuuz.exe File opened (read-only) \??\e: zgvuzuuz.exe File opened (read-only) \??\x: yxkurhjqga.exe File opened (read-only) \??\j: zgvuzuuz.exe File opened (read-only) \??\u: zgvuzuuz.exe File opened (read-only) \??\y: zgvuzuuz.exe File opened (read-only) \??\q: zgvuzuuz.exe File opened (read-only) \??\b: yxkurhjqga.exe File opened (read-only) \??\i: yxkurhjqga.exe File opened (read-only) \??\j: yxkurhjqga.exe File opened (read-only) \??\r: zgvuzuuz.exe File opened (read-only) \??\y: zgvuzuuz.exe File opened (read-only) \??\v: zgvuzuuz.exe File opened (read-only) \??\t: yxkurhjqga.exe File opened (read-only) \??\z: yxkurhjqga.exe File opened (read-only) \??\p: zgvuzuuz.exe File opened (read-only) \??\p: zgvuzuuz.exe File opened (read-only) \??\n: yxkurhjqga.exe File opened (read-only) \??\q: yxkurhjqga.exe File opened (read-only) \??\g: zgvuzuuz.exe File opened (read-only) \??\m: zgvuzuuz.exe File opened (read-only) \??\n: zgvuzuuz.exe File opened (read-only) \??\u: zgvuzuuz.exe File opened (read-only) \??\r: yxkurhjqga.exe File opened (read-only) \??\h: zgvuzuuz.exe File opened (read-only) \??\k: zgvuzuuz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" yxkurhjqga.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" yxkurhjqga.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2436-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00090000000234b4-6.dat autoit_exe behavioral2/files/0x0009000000023457-18.dat autoit_exe behavioral2/files/0x00070000000234bb-26.dat autoit_exe behavioral2/files/0x00070000000234bc-31.dat autoit_exe behavioral2/files/0x00070000000234c8-66.dat autoit_exe behavioral2/files/0x00070000000234c9-70.dat autoit_exe behavioral2/files/0x00070000000234ca-73.dat autoit_exe behavioral2/files/0x00070000000234cb-81.dat autoit_exe behavioral2/files/0x00070000000234dd-112.dat autoit_exe behavioral2/files/0x00070000000234dd-117.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\yxkurhjqga.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\yxkurhjqga.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rjbtwdbvwdargwm.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe zgvuzuuz.exe File created C:\Windows\SysWOW64\rjbtwdbvwdargwm.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File created C:\Windows\SysWOW64\zgvuzuuz.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zgvuzuuz.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File created C:\Windows\SysWOW64\uxqboywvtkowu.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uxqboywvtkowu.exe edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll yxkurhjqga.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal zgvuzuuz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zgvuzuuz.exe File created \??\c:\Program Files\UnblockNew.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zgvuzuuz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zgvuzuuz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal zgvuzuuz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zgvuzuuz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zgvuzuuz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zgvuzuuz.exe File opened for modification \??\c:\Program Files\UnblockNew.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\UnblockNew.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Program Files\UnblockNew.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal zgvuzuuz.exe File opened for modification \??\c:\Program Files\UninstallLock.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\UninstallLock.nal zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zgvuzuuz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal zgvuzuuz.exe File opened for modification C:\Program Files\UnblockNew.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\UnblockNew.nal zgvuzuuz.exe File opened for modification C:\Program Files\UninstallLock.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\UninstallLock.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\UninstallLock.nal zgvuzuuz.exe File created \??\c:\Program Files\UninstallLock.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Program Files\UninstallLock.doc.exe zgvuzuuz.exe File opened for modification C:\Program Files\UnblockNew.nal zgvuzuuz.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zgvuzuuz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zgvuzuuz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification C:\Windows\mydoc.rtf edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zgvuzuuz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zgvuzuuz.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zgvuzuuz.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zgvuzuuz.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zgvuzuuz.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zgvuzuuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxkurhjqga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjbtwdbvwdargwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgvuzuuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxqboywvtkowu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgvuzuuz.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yxkurhjqga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCEFABEF916F2E2840C3B4586993E97B38802F04369023BE1C945E708A7" edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC1B12D4493389852C4B9D733E9D4CC" edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF4FC8F4F5885139137D62E7E92BC92E636593567316242D691" edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC6091590DBB3B8CD7C92EDE534BD" edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" yxkurhjqga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F368B7FE6822DED279D0A68A0F9165" edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" yxkurhjqga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yxkurhjqga.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat yxkurhjqga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yxkurhjqga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc yxkurhjqga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" yxkurhjqga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf yxkurhjqga.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32352D0B9C2282236D3E76A770552DDF7DF264D8" edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh yxkurhjqga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs yxkurhjqga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg yxkurhjqga.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 976 WINWORD.EXE 976 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 4444 rjbtwdbvwdargwm.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 908 yxkurhjqga.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 220 zgvuzuuz.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 3932 uxqboywvtkowu.exe 4444 rjbtwdbvwdargwm.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe 3940 zgvuzuuz.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 976 WINWORD.EXE 976 WINWORD.EXE 976 WINWORD.EXE 976 WINWORD.EXE 976 WINWORD.EXE 976 WINWORD.EXE 976 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2436 wrote to memory of 908 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 82 PID 2436 wrote to memory of 908 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 82 PID 2436 wrote to memory of 908 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 82 PID 2436 wrote to memory of 4444 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 83 PID 2436 wrote to memory of 4444 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 83 PID 2436 wrote to memory of 4444 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 83 PID 2436 wrote to memory of 220 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 84 PID 2436 wrote to memory of 220 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 84 PID 2436 wrote to memory of 220 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 84 PID 2436 wrote to memory of 3932 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 85 PID 2436 wrote to memory of 3932 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 85 PID 2436 wrote to memory of 3932 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 85 PID 908 wrote to memory of 3940 908 yxkurhjqga.exe 86 PID 908 wrote to memory of 3940 908 yxkurhjqga.exe 86 PID 908 wrote to memory of 3940 908 yxkurhjqga.exe 86 PID 2436 wrote to memory of 976 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 87 PID 2436 wrote to memory of 976 2436 edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edacafbdc34678350a21dfc0d5ed812b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\yxkurhjqga.exeyxkurhjqga.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\zgvuzuuz.exeC:\Windows\system32\zgvuzuuz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3940
-
-
-
C:\Windows\SysWOW64\rjbtwdbvwdargwm.exerjbtwdbvwdargwm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4444
-
-
C:\Windows\SysWOW64\zgvuzuuz.exezgvuzuuz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:220
-
-
C:\Windows\SysWOW64\uxqboywvtkowu.exeuxqboywvtkowu.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3932
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:976
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD524c249e9ea4a09c03bec1b31ffb701d1
SHA18e9ca5fb2eb9c2a9abb68b3493acb73812668116
SHA256ed7fd4f2df4a86876aab59d71a20dd9aab7ffd5ed6d3ebf83ed2aea991dd760a
SHA512b8eb994bbad4840a4d2be8e3f799cdcf980639235bb9fb3b1eb4e99dc81b93e0166f37e671ca01a3085d894bf4e06a9ad4f1d142eb0bfba050a51c0c248170dd
-
Filesize
512KB
MD5605e70c78ea4dd155e0b952c77bd24df
SHA17f9e86111e7f0500fe757d8766b7542def7c37db
SHA256e76025ec92cc7a488341acc1792271f23f442e1ed48e90720c295e89fd978691
SHA512fd7d51b89a5350a24cc92de8584d6412abba59f9c9791d33cb7375f131e9b85610eb54920440a91f594700d987f9717a3be184227e42adb2aeaa4fc7f478642a
-
Filesize
512KB
MD59e3e81789d7c429fb22b4495b0a1e379
SHA1a7ede9ccf8c57e8df33a1e88001e56d2fcd50883
SHA2568a5f1e8195e819272af188bb0fbdbe44c550ffd6903ceb0cf6743202839bb8ce
SHA51262951470c18ef3adb0037b5ac4479303ba5ac4217149ff41d38da661c63649e223b3875c26f4d33222aff9ac29c27c07683ca386121245a4bf2c2b1a271c1f4c
-
Filesize
512KB
MD51101a284b8f7c8c74bc4d78bd53b5e8a
SHA1ea71b3e193c0b1bea8f39e4492904970a50a2dbb
SHA25689744301cb0dd1c49635f0b5418a02a288f6260393744521d81f5e0e4a3dadc3
SHA51241997160f457e302f10d4816e86055641aa9c8ca5f57e0b4c4dfa4445f120634fc552e3e226cf5406aaa39f41aa2d688cc9fc160f653e5c4417fe5fcfd625c99
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
439B
MD57fa2c54daf3e811885b2a52b5e95a246
SHA131b5107a1c0c6e706d3ae04892b5bb3b528d4cf5
SHA2568c7086db9eacf36677d6612cfbc0472cd3614d5ffd7a78970a75e37850147676
SHA51276003194057b9cd31149fe9bcef31d9978e26a8c0eb1e38273cd080f1f40cfa546aa47f14c2b089bc43b174d005add7e50446f9fc8039ab42189412da8ff0947
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5cc5beb6e0b25b240d2724ecd86b975eb
SHA1b37ba24a974e3e28d5ac9d9118a1426b6cb0f378
SHA2566bffe73051112bcbefe9c4b7381d3c8a6930c7a9c64a44186093f0fbc5a346b7
SHA5125c86569b24cda9ea1b8e8b9b8d90850d436e7baccd0c57750cbb99a7081ddd56c34ddc64a4f01db76176c215539a586fc2a015aea2a9dea5703d4325b2cffd92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD500ac63d5dfbfccc3a1ecd65320670634
SHA16b5fe31957bbe0d3f3f8cec04f23f96143a2d799
SHA2568c900c518f2a0ceb35b6cfd40771a566138eb1fc9c3be1a26ad6d46d4eb23370
SHA5123041475ac7d7a4835c08502276851abd990429a536d7af85f6fba1a42ce52a8fa84cb10e848356677634156b2b07621b15fab9024c8c659536091faae4d0f705
-
Filesize
512KB
MD5791cc0b8be81ddd0ed9196d1923ce656
SHA1472b5d3c09dee680043fd24ea9e669a76ce14288
SHA256f733df3bf6b9fae5eda2c0a288d38fd8b5e8b7cd18fbb596cad92c825a1ac836
SHA5120b92d127cfd2375236fe53544fe32f9f5feb22afb83da77b47001f9a3b57c17b54bd2b89822ce941fbe72167e28ec6081a961e3fc4ccd60adb520da12e0f8429
-
Filesize
512KB
MD52d251cffa504160c5584630e348ee1ca
SHA1fcd046bfcebbd33f6a11616c46ebbeadf1614f20
SHA25673ad8d9d6b6fd101b1cf0f8f87cf5acc0ebcf777bbd69b3f1cd0cf69ae739aa0
SHA512601d016467aeffe1ed7537ffe5e02d687cbf6670bfa30673b5f9b7872cbbf873f069b2b0312c82a43355e10a904dd32978a63b3b6e7df2841586c4e17d77946e
-
Filesize
512KB
MD5104e9f4f7768b450a1340447693ff4c3
SHA10f12e034b685ea7231f53e8ad444fc3a7d986130
SHA25646edcd8bcefcfc02de540fc74d6ac8367a0db424065abe3394a8183515e0fdd0
SHA512a225d65e517ce40eacb873c2f3f1d9a1b4b350057db4ffbb0ba55d0070ecd62ab40b337428ad9efcc7f9ef3dc2041ac1ad92b713b4a78774d7c8f4898de1427b
-
Filesize
512KB
MD52ba86e54f31d43fbae2dd7359f2b5a04
SHA1f50db2267c180ff863a09c62c819efd81780fe24
SHA2565a1b56dcb891e43243c3119da8746b66c0ca74fe6127bafe6deed235e43720b9
SHA51223055094c4237efdb34a03e30baddcf004df0aef03bd8fb43300769f1796ec6546f5afeac942369f3d63d58e6b13cb43de4f351b4e08b3151b5f67a311db2d5a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5a31be4ba522d62a3f11d480b149e3f35
SHA1549719b5b1ecacc8d4084f1c0421233a0df0d90c
SHA256f81d8b83369056a8d8e3ab51f8e0323babcf412d3545b33a368fd6795fc4c40b
SHA51266f2836bd56dc3f181d27aba7a5e07c1cc7a067fb05abca6ccf07515c2f3a2c484d493308337b606b4f2ef3d502f178dc433a4f36588e8d7af69170574db11bd
-
Filesize
512KB
MD5c4dc18e9f241734e71fad6ba4c53da61
SHA15a9bc9b6ec6966d4fb464b891a830497e13294cc
SHA2568452d0b1144743d24e05b502afad9495a6cda2d23508eae9d07996a5bc720c84
SHA512fd9a7599fd18e67e521e611a779c1f3dca567cf1aea200db7c83b7ca1936f2ecf61173b8393b44002ad76587174830097a94870a31886aae4203d58579c7fa78