Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe
-
Size
512KB
-
MD5
f5c2f77d7d5291d1e3ad1ed4dbd9b907
-
SHA1
63747ebd2dcfe538d76fba2e8a1d213d9c142bc1
-
SHA256
41de30d1fc6debf61a899dd4812a8c5a31f41df7df5ce5fc9d7cf648e411da60
-
SHA512
dee9acc8d9916ae13f2930fde084def771a4f8ad4e2cf51a8029fb9735a95ceee469c49d3ff32216a1e32519cce15a8a99f53fecff56a4f7cdfbda7b6b816d8b
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5J
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lcmtncvcuz.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lcmtncvcuz.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" lcmtncvcuz.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lcmtncvcuz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 3720 lcmtncvcuz.exe 5084 zlysqqcwubxoncd.exe 400 xjzyrbep.exe 4144 tpfmvmzqbxtfo.exe 3468 xjzyrbep.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" lcmtncvcuz.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aeguwgkd = "lcmtncvcuz.exe" zlysqqcwubxoncd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pudnhjst = "zlysqqcwubxoncd.exe" zlysqqcwubxoncd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "tpfmvmzqbxtfo.exe" zlysqqcwubxoncd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: lcmtncvcuz.exe File opened (read-only) \??\e: xjzyrbep.exe File opened (read-only) \??\j: xjzyrbep.exe File opened (read-only) \??\n: xjzyrbep.exe File opened (read-only) \??\o: xjzyrbep.exe File opened (read-only) \??\e: xjzyrbep.exe File opened (read-only) \??\k: xjzyrbep.exe File opened (read-only) \??\g: xjzyrbep.exe File opened (read-only) \??\o: xjzyrbep.exe File opened (read-only) \??\q: xjzyrbep.exe File opened (read-only) \??\s: xjzyrbep.exe File opened (read-only) \??\i: lcmtncvcuz.exe File opened (read-only) \??\a: xjzyrbep.exe File opened (read-only) \??\a: xjzyrbep.exe File opened (read-only) \??\i: xjzyrbep.exe File opened (read-only) \??\j: xjzyrbep.exe File opened (read-only) \??\n: xjzyrbep.exe File opened (read-only) \??\a: lcmtncvcuz.exe File opened (read-only) \??\l: lcmtncvcuz.exe File opened (read-only) \??\y: lcmtncvcuz.exe File opened (read-only) \??\m: xjzyrbep.exe File opened (read-only) \??\x: xjzyrbep.exe File opened (read-only) \??\b: lcmtncvcuz.exe File opened (read-only) \??\u: lcmtncvcuz.exe File opened (read-only) \??\h: xjzyrbep.exe File opened (read-only) \??\r: xjzyrbep.exe File opened (read-only) \??\z: xjzyrbep.exe File opened (read-only) \??\o: lcmtncvcuz.exe File opened (read-only) \??\x: xjzyrbep.exe File opened (read-only) \??\l: xjzyrbep.exe File opened (read-only) \??\v: lcmtncvcuz.exe File opened (read-only) \??\u: xjzyrbep.exe File opened (read-only) \??\t: lcmtncvcuz.exe File opened (read-only) \??\v: xjzyrbep.exe File opened (read-only) \??\p: xjzyrbep.exe File opened (read-only) \??\e: lcmtncvcuz.exe File opened (read-only) \??\z: lcmtncvcuz.exe File opened (read-only) \??\l: xjzyrbep.exe File opened (read-only) \??\s: xjzyrbep.exe File opened (read-only) \??\t: xjzyrbep.exe File opened (read-only) \??\z: xjzyrbep.exe File opened (read-only) \??\y: xjzyrbep.exe File opened (read-only) \??\y: xjzyrbep.exe File opened (read-only) \??\n: lcmtncvcuz.exe File opened (read-only) \??\q: lcmtncvcuz.exe File opened (read-only) \??\s: lcmtncvcuz.exe File opened (read-only) \??\w: lcmtncvcuz.exe File opened (read-only) \??\x: lcmtncvcuz.exe File opened (read-only) \??\p: xjzyrbep.exe File opened (read-only) \??\t: xjzyrbep.exe File opened (read-only) \??\m: lcmtncvcuz.exe File opened (read-only) \??\g: xjzyrbep.exe File opened (read-only) \??\i: xjzyrbep.exe File opened (read-only) \??\b: xjzyrbep.exe File opened (read-only) \??\h: xjzyrbep.exe File opened (read-only) \??\k: xjzyrbep.exe File opened (read-only) \??\g: lcmtncvcuz.exe File opened (read-only) \??\h: lcmtncvcuz.exe File opened (read-only) \??\j: lcmtncvcuz.exe File opened (read-only) \??\p: lcmtncvcuz.exe File opened (read-only) \??\q: xjzyrbep.exe File opened (read-only) \??\w: xjzyrbep.exe File opened (read-only) \??\u: xjzyrbep.exe File opened (read-only) \??\v: xjzyrbep.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" lcmtncvcuz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" lcmtncvcuz.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4724-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00070000000234cb-7.dat autoit_exe behavioral2/files/0x000a0000000234c7-18.dat autoit_exe behavioral2/files/0x00070000000234cd-31.dat autoit_exe behavioral2/files/0x00070000000234cc-26.dat autoit_exe behavioral2/files/0x00080000000234b4-73.dat autoit_exe behavioral2/files/0x00160000000234ed-211.dat autoit_exe behavioral2/files/0x00160000000234ed-213.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xjzyrbep.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xjzyrbep.exe File created C:\Windows\SysWOW64\zlysqqcwubxoncd.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zlysqqcwubxoncd.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File created C:\Windows\SysWOW64\xjzyrbep.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tpfmvmzqbxtfo.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lcmtncvcuz.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xjzyrbep.exe File created C:\Windows\SysWOW64\lcmtncvcuz.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lcmtncvcuz.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File created C:\Windows\SysWOW64\tpfmvmzqbxtfo.exe f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xjzyrbep.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xjzyrbep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xjzyrbep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xjzyrbep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xjzyrbep.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xjzyrbep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xjzyrbep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xjzyrbep.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification C:\Windows\mydoc.rtf f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xjzyrbep.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xjzyrbep.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe xjzyrbep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjzyrbep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpfmvmzqbxtfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjzyrbep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lcmtncvcuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlysqqcwubxoncd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334F2C7B9C2482206A3276D377202CDD7CF465AA" f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F06BB0FE1A22DDD10ED0A98A0B9111" f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lcmtncvcuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" lcmtncvcuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lcmtncvcuz.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B12044E438EB52CCBAD032E9D4BF" f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs lcmtncvcuz.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lcmtncvcuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBFFAB8FE64F2E3840E3A4086983E96B38A028F42600349E1BF429C08D5" f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193FC77415E6DAB5B8CC7C97ECE437CD" f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat lcmtncvcuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" lcmtncvcuz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc lcmtncvcuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" lcmtncvcuz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf lcmtncvcuz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg lcmtncvcuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF5FCFE4826851C9045D72A7EE6BC97E130583066436341D79B" f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh lcmtncvcuz.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1696 WINWORD.EXE 1696 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 5084 zlysqqcwubxoncd.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 3720 lcmtncvcuz.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 400 xjzyrbep.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 4144 tpfmvmzqbxtfo.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe 3468 xjzyrbep.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1696 WINWORD.EXE 1696 WINWORD.EXE 1696 WINWORD.EXE 1696 WINWORD.EXE 1696 WINWORD.EXE 1696 WINWORD.EXE 1696 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3720 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 82 PID 4724 wrote to memory of 3720 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 82 PID 4724 wrote to memory of 3720 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 82 PID 4724 wrote to memory of 5084 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 83 PID 4724 wrote to memory of 5084 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 83 PID 4724 wrote to memory of 5084 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 83 PID 4724 wrote to memory of 400 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 84 PID 4724 wrote to memory of 400 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 84 PID 4724 wrote to memory of 400 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 84 PID 4724 wrote to memory of 4144 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 85 PID 4724 wrote to memory of 4144 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 85 PID 4724 wrote to memory of 4144 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 85 PID 3720 wrote to memory of 3468 3720 lcmtncvcuz.exe 86 PID 3720 wrote to memory of 3468 3720 lcmtncvcuz.exe 86 PID 3720 wrote to memory of 3468 3720 lcmtncvcuz.exe 86 PID 4724 wrote to memory of 1696 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 87 PID 4724 wrote to memory of 1696 4724 f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5c2f77d7d5291d1e3ad1ed4dbd9b907_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\lcmtncvcuz.exelcmtncvcuz.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\xjzyrbep.exeC:\Windows\system32\xjzyrbep.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3468
-
-
-
C:\Windows\SysWOW64\zlysqqcwubxoncd.exezlysqqcwubxoncd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5084
-
-
C:\Windows\SysWOW64\xjzyrbep.exexjzyrbep.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:400
-
-
C:\Windows\SysWOW64\tpfmvmzqbxtfo.exetpfmvmzqbxtfo.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4144
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5b599d9d4d8e4934c919978e7c683ff97
SHA171e040115a6b928a4491a5f95985e619d9a1a070
SHA2568ef7a23542befe086817d0d719aceec6dd3dc2ad2c4dae1b5b8abc2504bfe3a4
SHA5124fc84e82303f4e191c41e9f11154c3c9db3158f3caed7f8b4d2329c66a5767015478fac53319a754abb48cdf179ab046c6290bcaa45c82fadfd927560f1aef95
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
385B
MD5ad955068a52577e7632b6e4d5bfe42b7
SHA1c00133fcfde7305cb1ba012d6e58e167ed732edc
SHA256a0aa956cd288598a6b6ac83f524db4e65b02f0cf2fc92dc69b845c6606bc7165
SHA512b375578988b23b6433d2b4f363384db6b4b564fd9fd16918358a3a3c77e7787685b3f87c13bba6bf6dd0dee4c4b02adbafcbbb93748cf3826dbb17519538ea93
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5737a8cde0220f1cd0c6de7065d9ff633
SHA1cf51ce223ba31b0f20830983dd9fb3e9892b0c7b
SHA256d54cf1ddbea84ac8b3938e5bd9a0e149f7c3876ea71883e5ef97eef3148bc888
SHA5123bfb721bdb7a0634cdd695f2293b109763d0500dd8f27aab02587762935807f413833755dea1237a7bed262f9cd72e7815d3dffa912c90221930854a65c9c92b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD529fd66ac67f5b68d2b82575fcf3cf71b
SHA1b8ab78f4fd4cb13972c213d1c56a917895fa1007
SHA256f31e4fdfb8d56a73921e908396cb86bb84a1da7bfce646199aa62abc245543d2
SHA5122e265ed7eeb18ca4a81e2c1f52fc063a95486f8318ee05d4b247c1579d5f23fa1e9257c3e7a630cfe0079aaf5ee208602f7022573865dd6598913dd6d8096d0a
-
Filesize
512KB
MD59002045611cd78b9eac229be77b28901
SHA18310f6d4519c4f48e4b72555193ff357493d8213
SHA256448c05ced8c1d1bc2e77f7319f54b1dff4db1a1bacb5add1260f94629780dad9
SHA5122c8210fc9a125a13120bf53d57ce7f3a3252b611f8281fc3abbc2976c843ca4d9f1354dd3b30c9903d87e3c2b4c8e2fb30b4844b89ff24725e2540a476fd8e6f
-
Filesize
512KB
MD5f0128239f90b941f8059c18197b225f0
SHA1873e6b7dc5f11f108ffe15b893955b08d4e76abc
SHA256a63a633ad198e365c83bf0f83cb1b23a5d449ade115a831937418d80a04290dd
SHA512ad34dc94cc0fd946b5ff18430f5350076bb6543997d274b92109b2f6ccf8c1740e42211ea4bb1b3fefcb076f762bf1cf85df54fd05ceb4b4ff89c6715d2bf328
-
Filesize
512KB
MD504578b029267e2c6afaf32a5286281fc
SHA1b88c113fd4727b8de020c34848adffd8f019a207
SHA2564ce65f6a4f53a7cb21808d0dc9a00750eb1241f26d5936dd6f9eba07c8597888
SHA51289ad3d92fa90d28d1385999507f21a025413d7710c8e47b7849c45bd1e67ce22e4506c8080640988168e673f8ff26c0da358bb6614806bfafad130eddec27211
-
Filesize
512KB
MD5c782e827c35be22d7fe71d475e36f9b1
SHA19dc2827424e4eec2b837ba7a40ae59ebb42a4726
SHA256130d49c26c1ad0588dd904ce0110dbd983e91e905417a9bcde68d8b1e60e2146
SHA512af242c12c983e270522d4862258e1a736cf9f6116c9fcc191f5f477e95b48cdae9b9d25f3b2799af5933386957acba7d780ffad1d92a87abab41bafb1d9569f3
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD519c3b1718bac1234ff83afd2cc03e377
SHA1acf46803fd586071b1c9898a39179af7807abc86
SHA256428db1f8600c96790988e71170b62cfca8a463cdb242c25162d05f82aa343957
SHA5125f1cf7d89be7dd661c58a34eb8f8adaa35bb9e23cbad62a8dd9eae2ba3dba7c9e0898970a9da29a5db2c8a99139485918f92003bb2285cf7e8702528fc9c1394
-
Filesize
512KB
MD59802a4b56707592e50327554dccee1d6
SHA131307a7f24e9bf090cb2351878baeec929264841
SHA256e9669f22b54309278e5de2f814d447425ee86134664ccffe9b4483972f07215b
SHA512d269c06d25b31ead0dc8431fbd26d93350040d49d317129f6e87b7ca845da662802ed655c20b50992231fa022ccd2b381a97076f5ca216b2a58e37dae321d153