Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 02:24

General

  • Target

    eee5912df87c408f7e7a3aee0f7f75e3_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    eee5912df87c408f7e7a3aee0f7f75e3

  • SHA1

    731d102a671ce82ad2a3332598b0b02bccfd65cc

  • SHA256

    546d1c2a377b5e6a5775b43d607ad902b351d0b61a7350d69254862ab816e031

  • SHA512

    645112feb2e4cd149b00419d805a5c3afd6979a499e370292d122e81806ad63e5280b3a4b5fe2b095a59cd756ea8320f507660b8393574594b2fb444fb4198a0

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6R:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5O

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eee5912df87c408f7e7a3aee0f7f75e3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eee5912df87c408f7e7a3aee0f7f75e3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\wnmhrsssfa.exe
      wnmhrsssfa.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Windows\SysWOW64\qbmuzizq.exe
        C:\Windows\system32\qbmuzizq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4288
    • C:\Windows\SysWOW64\snhxpfwbpeaposj.exe
      snhxpfwbpeaposj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1984
    • C:\Windows\SysWOW64\qbmuzizq.exe
      qbmuzizq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:232
    • C:\Windows\SysWOW64\lsesvcwjiuflb.exe
      lsesvcwjiuflb.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2644
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    cb7f5a40fe6fb6b62856cba3533a01df

    SHA1

    26bcbda6c9b8d4f0860a10d03a75c8689bb7bebd

    SHA256

    eb60f1ddaea644588a475db779e989a4f6654e8d204fe5519a1b1bc3ada4171a

    SHA512

    143c6500ecd7990479b593a72065f2e2332f2f2824c0aa13d23c321ec43e4ec5fe52e9c411b0d8e00698dfb05e585a1cf41b4065aa99caadf00b2fe754ee273e

  • C:\Users\Admin\AppData\Local\Temp\TCDF3AF.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    425B

    MD5

    c86ac5202d64753b8f9322a1c0f9d529

    SHA1

    e79b4703dc6e690800fac25b99e99391e0837fd6

    SHA256

    82ed1085299498d1510cd83e42d03348372da2d9db1fdf2051832845dea22d0e

    SHA512

    db01322b854464af0458bb94cc95c13d435de5e73f504d7d5155bfd6e80a8cbb4ab0912bc945abd70184c89069793474e1f6b45f7c82ae7e5295586d84fd8d00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    c3f9b71dffc054962f0abf1adfe1a978

    SHA1

    eae788bd607c9a6d947bb13a7e15c3484f4d5af3

    SHA256

    5529ac22ba5a4d9cd2aee15fa1dc251ebeb293238853d1a85759fe16586fb42e

    SHA512

    4bba21daf3f2fdea90bca6b7e6f47156eeca8891baa71ab4b89aa002690ca4874521d6a356828b099beaab504ecd583c76cf01408f2a2b3574b8a3852313165f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    609ea7deb70d442154dea83487a29592

    SHA1

    7c43107ccbd53e063b47e4c3b2f1bab01d884c21

    SHA256

    d33fd347959cc29c983c2740ed697e40743dd1f21e3dee4cd1c82a49c40fdd91

    SHA512

    d2c0ba62602ea2f3099cb6cbc40e468ce917386e40817c06792aef69d5d7de12a9420c60d302b1256aae1b86f7e928867e75309ee8ce8b0ae91755209ba1ef7a

  • C:\Windows\SysWOW64\lsesvcwjiuflb.exe

    Filesize

    512KB

    MD5

    1cc7e37a9f5517e84beb0553f283d24d

    SHA1

    20168f2c9424342bdfc9ddce1e2428730f149bca

    SHA256

    dae94b28075a7997558bd417c257cd18ae42800a9258d1b4c61bf8dbaa5b97a2

    SHA512

    f9ec948d55e7271e9408030bddbe075ceb686fcb8bc4cbd7853c2a48c1f7e7660c6d0c6f833c915a2de004579b72460ea482643351ef1a049fc45aaf26aa7b28

  • C:\Windows\SysWOW64\qbmuzizq.exe

    Filesize

    512KB

    MD5

    47eae823eb12665ceff7d997fec4119b

    SHA1

    4da8f571bd1f926a2846ad52e4f5a397718ee7e8

    SHA256

    4f8f5b5ad12b31c364193f121e92f053c6056542170c30b9d555a2c1776ee382

    SHA512

    4a5072db07a7ecbb2f3c943aa42b0d1834552b25404d790445d8ab1a24d1854f7489e9d7f580773828d5a55fd8a9bb66dd29f13db0986e7da52e2d884d27072b

  • C:\Windows\SysWOW64\snhxpfwbpeaposj.exe

    Filesize

    512KB

    MD5

    b3ad0bd27076bb73acddcba0f17abdd7

    SHA1

    38fb59938a1d046949f3eb6920ff1ca3397f46c0

    SHA256

    7a935d75874e41e1395eef228c3fbf20af628ccc886fca5c7723eaa26aed3544

    SHA512

    a66175a8bca13d731b707eeed43d77508d734c31dbb0368ff071c500d98caa26657c2f0cc5d78cedf6560cb5955b54dedd497d500e381e56860ecfc2c00d8ae7

  • C:\Windows\SysWOW64\wnmhrsssfa.exe

    Filesize

    512KB

    MD5

    c9349a51e1b61f54305dc589f4c871c8

    SHA1

    cf958b5a1e50b9955336fa4dd4f133f2b513e95e

    SHA256

    5b176c9125412f4f143d90a73d54907e00722b432c770544fe2c7d1801f8ebcb

    SHA512

    490b6d0c13195f791da250e753f52c59aeba73211e1d70909c3162f36dd8837729ee64fca92cce6311c35995759695a5fc703bf3231fb8c666251bd9108faa5b

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    db7df69ac64ed70751fba4a43db09c95

    SHA1

    0727889790cc14b5f68cde56363c36b5dd7cb47d

    SHA256

    e266f6d385e3e383916f8109cbc966067648ba15e67dbf77f381a0a49aa4d3bb

    SHA512

    eee9a6e12879049756140167e628ee6ade4befe6429e5c79bdbafd204c0b55cf754fab20d089186ef915831b8f3e17b8cfbd6615dcb8ff9ed1adef47606554ac

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    51473fd62fdc42904719f4048632fef4

    SHA1

    e942e45f8b19628bd3eb2d9755aabc83c94deb42

    SHA256

    84f822ee80c54b58a7c1c0004accde208e3a7acf72deb94aa8b4bd69ea4a41cd

    SHA512

    ad55bb0ea647223cadbac0b352a0922de5139e7738e93dadabdb35b3046563155dce8f0d6c2d446b525ab1c723223b451f28ba13443c9976daee797f339cc255

  • memory/1852-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2724-43-0x00007FFCAAFC0000-0x00007FFCAAFD0000-memory.dmp

    Filesize

    64KB

  • memory/2724-42-0x00007FFCAAFC0000-0x00007FFCAAFD0000-memory.dmp

    Filesize

    64KB

  • memory/2724-41-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-40-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-39-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-38-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-37-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-322-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-321-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-324-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB

  • memory/2724-323-0x00007FFCAD070000-0x00007FFCAD080000-memory.dmp

    Filesize

    64KB