Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe
-
Size
512KB
-
MD5
f557e23fbaea06dd8d1346e9860dc6b4
-
SHA1
84a168ee2c1e2666cd875f0665b4c0129ba14182
-
SHA256
5fd71f2dbaa454af5af5f6153ce00832188b2b559092309c9e790655634c4eeb
-
SHA512
ae74292424ea93dd0a50bb99158b114c6b1e3b167704e1b965043bdfa0309a444d35d42d258fc9d74755738b2241f9cae76a6a605280c98f3eeff33260f5fe3d
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5p
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" kijjqfepho.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kijjqfepho.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" kijjqfepho.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" kijjqfepho.exe -
Executes dropped EXE 5 IoCs
pid Process 2784 kijjqfepho.exe 2968 ajmpfzkhkebaioe.exe 2704 leplqfov.exe 2696 cbouczlxumijl.exe 1636 leplqfov.exe -
Loads dropped DLL 5 IoCs
pid Process 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2784 kijjqfepho.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" kijjqfepho.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kxfekbic = "kijjqfepho.exe" ajmpfzkhkebaioe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zhorzvgb = "ajmpfzkhkebaioe.exe" ajmpfzkhkebaioe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cbouczlxumijl.exe" ajmpfzkhkebaioe.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: leplqfov.exe File opened (read-only) \??\j: kijjqfepho.exe File opened (read-only) \??\k: kijjqfepho.exe File opened (read-only) \??\b: leplqfov.exe File opened (read-only) \??\e: leplqfov.exe File opened (read-only) \??\m: leplqfov.exe File opened (read-only) \??\s: leplqfov.exe File opened (read-only) \??\g: leplqfov.exe File opened (read-only) \??\o: leplqfov.exe File opened (read-only) \??\x: kijjqfepho.exe File opened (read-only) \??\z: kijjqfepho.exe File opened (read-only) \??\q: leplqfov.exe File opened (read-only) \??\h: leplqfov.exe File opened (read-only) \??\a: kijjqfepho.exe File opened (read-only) \??\l: kijjqfepho.exe File opened (read-only) \??\w: kijjqfepho.exe File opened (read-only) \??\e: leplqfov.exe File opened (read-only) \??\y: leplqfov.exe File opened (read-only) \??\t: leplqfov.exe File opened (read-only) \??\p: leplqfov.exe File opened (read-only) \??\p: kijjqfepho.exe File opened (read-only) \??\h: kijjqfepho.exe File opened (read-only) \??\r: leplqfov.exe File opened (read-only) \??\m: kijjqfepho.exe File opened (read-only) \??\o: kijjqfepho.exe File opened (read-only) \??\w: leplqfov.exe File opened (read-only) \??\i: leplqfov.exe File opened (read-only) \??\o: leplqfov.exe File opened (read-only) \??\r: kijjqfepho.exe File opened (read-only) \??\m: leplqfov.exe File opened (read-only) \??\v: leplqfov.exe File opened (read-only) \??\y: leplqfov.exe File opened (read-only) \??\z: leplqfov.exe File opened (read-only) \??\b: leplqfov.exe File opened (read-only) \??\j: leplqfov.exe File opened (read-only) \??\s: leplqfov.exe File opened (read-only) \??\q: leplqfov.exe File opened (read-only) \??\b: kijjqfepho.exe File opened (read-only) \??\q: kijjqfepho.exe File opened (read-only) \??\v: kijjqfepho.exe File opened (read-only) \??\n: leplqfov.exe File opened (read-only) \??\p: leplqfov.exe File opened (read-only) \??\g: leplqfov.exe File opened (read-only) \??\n: leplqfov.exe File opened (read-only) \??\t: kijjqfepho.exe File opened (read-only) \??\x: leplqfov.exe File opened (read-only) \??\w: leplqfov.exe File opened (read-only) \??\x: leplqfov.exe File opened (read-only) \??\k: leplqfov.exe File opened (read-only) \??\u: leplqfov.exe File opened (read-only) \??\z: leplqfov.exe File opened (read-only) \??\u: kijjqfepho.exe File opened (read-only) \??\v: leplqfov.exe File opened (read-only) \??\i: kijjqfepho.exe File opened (read-only) \??\n: kijjqfepho.exe File opened (read-only) \??\s: kijjqfepho.exe File opened (read-only) \??\k: leplqfov.exe File opened (read-only) \??\r: leplqfov.exe File opened (read-only) \??\g: kijjqfepho.exe File opened (read-only) \??\y: kijjqfepho.exe File opened (read-only) \??\j: leplqfov.exe File opened (read-only) \??\l: leplqfov.exe File opened (read-only) \??\l: leplqfov.exe File opened (read-only) \??\e: kijjqfepho.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" kijjqfepho.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" kijjqfepho.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2496-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000800000001612f-9.dat autoit_exe behavioral1/files/0x000d00000001226b-20.dat autoit_exe behavioral1/files/0x0007000000016307-41.dat autoit_exe behavioral1/files/0x0008000000015f81-27.dat autoit_exe behavioral1/files/0x000700000001658c-73.dat autoit_exe behavioral1/files/0x0033000000015db1-71.dat autoit_exe behavioral1/files/0x0006000000016dd1-87.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\ajmpfzkhkebaioe.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\leplqfov.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\leplqfov.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\kijjqfepho.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kijjqfepho.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ajmpfzkhkebaioe.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\cbouczlxumijl.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cbouczlxumijl.exe f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll kijjqfepho.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe leplqfov.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe leplqfov.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe leplqfov.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal leplqfov.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal leplqfov.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe leplqfov.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal leplqfov.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leplqfov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajmpfzkhkebaioe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kijjqfepho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leplqfov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbouczlxumijl.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "194AC67915EDDBC0B9CE7FE2EDE034CB" f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh kijjqfepho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" kijjqfepho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B12F44EE39EE52CFBAD4329AD4B9" f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFFFC482F826D9142D62D7DE0BCE5E637594A674E6334D798" f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78368C4FE1D21DDD27BD0D38A099110" f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" kijjqfepho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" kijjqfepho.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB4FABEF960F299830F3A4B86E93999B0FB02F143110338E1BE42EF08D6" f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" kijjqfepho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" kijjqfepho.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33332C089C2383556D4676D670232DDE7D8664D6" f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc kijjqfepho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf kijjqfepho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs kijjqfepho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg kijjqfepho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" kijjqfepho.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat kijjqfepho.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1304 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2704 leplqfov.exe 2704 leplqfov.exe 2704 leplqfov.exe 2704 leplqfov.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 1636 leplqfov.exe 1636 leplqfov.exe 1636 leplqfov.exe 1636 leplqfov.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2968 ajmpfzkhkebaioe.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe Token: SeShutdownPrivilege 2776 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2704 leplqfov.exe 2704 leplqfov.exe 2704 leplqfov.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 1636 leplqfov.exe 1636 leplqfov.exe 1636 leplqfov.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2784 kijjqfepho.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2968 ajmpfzkhkebaioe.exe 2704 leplqfov.exe 2704 leplqfov.exe 2704 leplqfov.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2696 cbouczlxumijl.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe 2776 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1304 WINWORD.EXE 1304 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2784 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2784 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2784 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2784 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2968 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2968 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2968 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2968 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2704 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2704 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2704 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2704 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 32 PID 2496 wrote to memory of 2696 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 33 PID 2496 wrote to memory of 2696 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 33 PID 2496 wrote to memory of 2696 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 33 PID 2496 wrote to memory of 2696 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 33 PID 2784 wrote to memory of 1636 2784 kijjqfepho.exe 34 PID 2784 wrote to memory of 1636 2784 kijjqfepho.exe 34 PID 2784 wrote to memory of 1636 2784 kijjqfepho.exe 34 PID 2784 wrote to memory of 1636 2784 kijjqfepho.exe 34 PID 2496 wrote to memory of 1304 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1304 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1304 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1304 2496 f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe 35 PID 1304 wrote to memory of 1524 1304 WINWORD.EXE 38 PID 1304 wrote to memory of 1524 1304 WINWORD.EXE 38 PID 1304 wrote to memory of 1524 1304 WINWORD.EXE 38 PID 1304 wrote to memory of 1524 1304 WINWORD.EXE 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f557e23fbaea06dd8d1346e9860dc6b4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\kijjqfepho.exekijjqfepho.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\leplqfov.exeC:\Windows\system32\leplqfov.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1636
-
-
-
C:\Windows\SysWOW64\ajmpfzkhkebaioe.exeajmpfzkhkebaioe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2968
-
-
C:\Windows\SysWOW64\leplqfov.exeleplqfov.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2704
-
-
C:\Windows\SysWOW64\cbouczlxumijl.execbouczlxumijl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1524
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD551eaf19314a72d5ff538643dbda6af20
SHA128d5cdcd4b0c70d5f9269fe5a08bcfaa00299bcb
SHA2564260eda70c568ee1f54e36caecdb3db60dd628a432aa560bb8c63e32d80773b8
SHA51257dd0785b955f9e901b3ba0d062a7824b0aa3cbc5f6026cb9e4569b057f81d38f560c46755e46eb339e7c9ebef018a7cdccd5095504c6e248bd9378b00a70dde
-
Filesize
512KB
MD5072f82ba1e81883c91d1eb00b0b47d4b
SHA1cc3875a1b275fa13e68ab29196be4beeef6d19b0
SHA256e6aeb1b175188a5b0fbd14c3c093d7ee25c0ccc59554adf5a12fb32d76288a90
SHA51270776b9f17f99474d107f600792f0d8647e347e3c4f3c8857ca5dce903d603c913f3957831cdc75bd00be7eaecae87f6e27f8c32e321d48a7ec33456e5d33104
-
Filesize
512KB
MD5b8431873f15b4bef22c41b36606aab77
SHA10e7cf95400ef8ed4eaed0d5191ddd3f4beb27beb
SHA25674f35ad768ed54d30338a2b1b95b338ad80b14e3cbee78ff6c39f85b7ed036f2
SHA5124721e9228e7a245efc0a1d530ef06b235ef441ef9a17e66351170d42cc79408872e9fbf310f46462fb8ff9e822ee766af0e4f3c90383556516cb1449d4696556
-
Filesize
512KB
MD5142b16b0cc9e4b98892a43d828e4fa33
SHA142b318ddec152faa517918dc65879669ca3c075f
SHA256adba48a725426a10fba27843a3a0690955e3b759c628505cd0809df0d8f5207d
SHA51220b37e2067718f54597318bca0e1abac0b1b0ede444939f43711e2918158f2d9adf7845aed48a4f156f33af4296c6f9169252e17bdfac7243bbb22ead085ace3
-
Filesize
512KB
MD57b750f707d9561c93d4971ce5427422d
SHA1ecc4453301bcf0fea5d0afa4de6ef8a70317ef92
SHA2562a5431e92e15283791ce17fc303475ee1f6eb0c0757561384ea39355a26b4604
SHA512faa035971fb74e031bd5bfaca30075bc1db833ae42a92256a79dcb910ad72f373c092ec74e327cc9360e6dc60f09bb80369a619d4d263ff9a5f9ec660a59e0f9
-
Filesize
512KB
MD52086c873b139b9f3f46353a5b7b5f1d1
SHA1fe32956ed3b1beb173bc82de2586967bca75fb9c
SHA25680c97d40ac61d7986cc0f1d1407c73d1ed0f8136de9d5b033687cd7389347a96
SHA51237be4954488f95057c513ba7f4158ad966f147b74d91c8d9d9eb1cc62cfcf1097cc3df90f7b6e66fd97adee705ec03236de61040608683e608ddc5451507d9e6
-
Filesize
512KB
MD57d849c26e20b72f954e2612e81221062
SHA1317e61d3a5ed62f4c8db9f545bec1e1bd8d067dd
SHA256ddcc973701e2a59288dc6f5b5ca21b914353153dd9e15ccd099880993d3f092f
SHA512602f1f4ca688d85eb760ff2753d6f4179c9ca8af7123f14463d08fc3570c3e7e877303b251dddb933225641fd590dea92769081c011111a43250579f903be744
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7