Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 20:29

General

  • Target

    ee5e6fea32f00c231e2ceb684d8c1585_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    ee5e6fea32f00c231e2ceb684d8c1585

  • SHA1

    2334a9434d70723574a57d77f76974cb1b7fe70b

  • SHA256

    e0b1f76c0c8328ca4b4eb476b18f95359e63165495987a3158865f8955f73518

  • SHA512

    5febd2abff8c88da07e2e8365fe0d31be65c9ee7147c474261108a67c04632f95760e70cf178cfec1daabab2fde10b1d439bc0e02abc074c4780bb4529774e11

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee5e6fea32f00c231e2ceb684d8c1585_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee5e6fea32f00c231e2ceb684d8c1585_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\SysWOW64\ixfhanfbln.exe
      ixfhanfbln.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\bpzrziyw.exe
        C:\Windows\system32\bpzrziyw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2560
    • C:\Windows\SysWOW64\jhykesxeidjirft.exe
      jhykesxeidjirft.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2824
    • C:\Windows\SysWOW64\bpzrziyw.exe
      bpzrziyw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2352
    • C:\Windows\SysWOW64\xgbtqgrethikd.exe
      xgbtqgrethikd.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2680
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      7f664334bce55cba4a963cba5955079e

      SHA1

      5843e68274c34ce6f59cda023ce001f743f462ab

      SHA256

      f2786ed32a7d45561defe5c0b66059d1eb8d00b7d8523edb9ce055fed8ed1e49

      SHA512

      b3d6f82ede84e3a3bfadf4c6e7ad358afbebfd32c4968faadbf664df1164bbb8c423800d3b30c0e0d0f8db63af2cce968a9182f0461500f01a27a3944cfef276

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      16603b24d5ddc359ae4f6fc07cc67a56

      SHA1

      6428d568411c3cd42e0dd7c6fa48ac4a4db737e6

      SHA256

      8fcb2b94f9f1d815693b89b3fbf0f67744ca2ddd62e07491446d8b9707bbf2cf

      SHA512

      743de7f2a11dd03c99b09a842502a9cabdd123fd931ed842a7421bff38c5e30ae0e4573d0c5882fe487ec09008e02e5145dbef73d0f76afb904deddffea4de5e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      1646750b053bc39a8569fdc310035f63

      SHA1

      d75032c4ff03b3a2b1ec3a4c1ff0ab084a5d65b2

      SHA256

      1aed864d8aa50fab9824888f4e398ec0b4979a96ba42f881c7f8bb7840867c11

      SHA512

      d30757643c061a596891e582bbe0d5ea23c8a3417e41e4f51bdb302af86721d9a76ed7ed6320d22d6e6d9c90dc51dec780f9955ad3753a40a931ded8611c6dd8

    • C:\Windows\SysWOW64\jhykesxeidjirft.exe

      Filesize

      512KB

      MD5

      20f2f7a841b82d424f11a78836d5ba81

      SHA1

      a81e3849e3e22ff01f16ecae03f2c58665262ecf

      SHA256

      291184c3977fa8192880a0b7511bd7578365599989a144d0bf74fc93cea0a925

      SHA512

      a1c4967473bf1b8822174ec1ef94abeb655070686931c41937140a60653081c2193a90f9c525e90f23b16d3f136e82b6b8804e6f6ea7b3a6c328baff49888444

    • C:\Windows\SysWOW64\xgbtqgrethikd.exe

      Filesize

      512KB

      MD5

      b308a2bbe92fedaf267749515c24e379

      SHA1

      2563264fc7c1a64b353c46bf52f64bcead2e5918

      SHA256

      0dc41ab8218f9ac44183c797716c1e4b9d9443f491a1d94585b82ab36623011f

      SHA512

      3134459f1c6fbd5600a2e15bd101206df37b5a6e7d7d4b9ed34659dd09327637c9c323b8f720ab1ca154d8c1e5c4b355c8d6f6ba4c835c8d1eba0d773ff13f9a

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\bpzrziyw.exe

      Filesize

      512KB

      MD5

      cb3c32afe266cb711fa0d5609fc99511

      SHA1

      b88f8380ed3d3511d511b5a808482a326f567455

      SHA256

      211bf650200945bc1bbb4512f4e65fa6bd26bc9da25b3337333e439d35c12685

      SHA512

      4dfa1e9c33913480a1132ddece8f76b810e84ab9a78be8d6e1c0b438aab059ec22a69c65bded07b91ed3995faff8ecb5d94d7f687817d78fc363b7e5f86576f1

    • \Windows\SysWOW64\ixfhanfbln.exe

      Filesize

      512KB

      MD5

      319c4df8879e252ecf6958d0824d5858

      SHA1

      72ffbf6df9e6f00168c5c3266eda56b454df6837

      SHA256

      8991493cc4862e03a4f8ea3ba0d1ca991eb167c686fb7046267a9c245f88f207

      SHA512

      39244fe57b86f34937e960293fc021e118705de457536ef4c807c83695aef436d339799c1c229b7e2d2ebebe393cdd0dc99b886076bd4613c6a03fbd1d3dc178

    • memory/2652-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/3004-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3004-94-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB