Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 20:25

General

  • Target

    f6cc0abffe9509e95744869f94c62d58_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    f6cc0abffe9509e95744869f94c62d58

  • SHA1

    5dae7805c0ce770c81c92dcd350e8b86f918e82a

  • SHA256

    5ed8e02162abb4f4d6a79fc6379329c4af5e843fa66865d1155fe50b0c226e23

  • SHA512

    ff9a61bc3753fe47c22f4bed9c43cd0c6a09ee5ade46e867ea4c2fa56285febcf3a8dd2138905c36b68be33101a92ecab09c5e3565ce137bbfbadd62b91710e5

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5i

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6cc0abffe9509e95744869f94c62d58_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6cc0abffe9509e95744869f94c62d58_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Windows\SysWOW64\rrtanurkry.exe
      rrtanurkry.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\tyhfwchu.exe
        C:\Windows\system32\tyhfwchu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2696
    • C:\Windows\SysWOW64\ttooymyzurvlnel.exe
      ttooymyzurvlnel.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2880
    • C:\Windows\SysWOW64\tyhfwchu.exe
      tyhfwchu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2804
    • C:\Windows\SysWOW64\fmuzcmvdvhwyt.exe
      fmuzcmvdvhwyt.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2656
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      cb2645292ccbd2c3a57774f182e89def

      SHA1

      a1762d16b8f770e9242c65d4c70076a0976fcdb2

      SHA256

      6b5e2ef07e090f0652ff03c53f0f559b9610823f994b46a77a0b26b83fc9430a

      SHA512

      a90984bd486cf02a0bed022543244f7303770ed55f831fe131bc8eca68a95d23faabd3ab5df4fbb4f993b5770b3b179c2ce9f58c7da83886889dba4c3d769d84

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      b3ce36a6bb1052ecac8a24807dc8094b

      SHA1

      aae93fcdf5836727e98aa3e6d71c7e2b8634e21b

      SHA256

      757b9d9f49ded7c904dce06cdbdd1df9c796a5faf5ec939409619bc5b95f28fc

      SHA512

      8b16599e2efdb16c7a7f155bf72167e48b5d4b8c751aa87f0b30d5bf98b5d1303a762f35ea177356bd9dd6a70f5ed01560996e6bda7b87c711c9b3971fd7f0a1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      c39b20438ea758bc7bd158bdd183ba15

      SHA1

      fce2b895b99d056a9cd86ac72ccfd9165c1a0c92

      SHA256

      26600af91c5446ead9ccbb44d7d2ae8acf1f681ddafa13595ef8e138f4ed2691

      SHA512

      4c473c754296f0e098b1141e64542c953f2273fd92f20a4564a4fc1dbdf4039fa42157ac01e935abc20205f046b22f7b0115a0590844066cb125fc25697ccb73

    • C:\Users\Admin\Downloads\RequestMove.doc.exe

      Filesize

      512KB

      MD5

      5bb895e2c6c91f2ea0cdc1dfc8f31349

      SHA1

      d7e1cb8cc6a76e0ea5fdd807693565061c9381e4

      SHA256

      d0573c21c8c3074db27bd2ef693af99cd71d959f78e95035ad075f83d82bff8a

      SHA512

      dc5808aa50dd58871bb01f8236789a80b47a05c8074a4943b474e9e47a6abbf2814844e68a22a81d32f92438716c67b4816a9bb4f54ebd75acdf789087103fa2

    • C:\Windows\SysWOW64\fmuzcmvdvhwyt.exe

      Filesize

      512KB

      MD5

      f9212dec400cd9b884e5000b14b987a6

      SHA1

      d056f55d81d74921892ba4f4e04ad78bdc14f77b

      SHA256

      63829943745dc129a30891f0345deee380c6c53b323698744d6f9418fb880581

      SHA512

      b32ec300e2410568015fc056100043cfa4567078bbdcffc69fe4375dd49bc2d640f2d0bc68177902d0f41c49cf2cd2e121d03ac4c63740a896a7595f6333817e

    • C:\Windows\SysWOW64\tyhfwchu.exe

      Filesize

      512KB

      MD5

      3757508880053418304d3fc54ac7d4e7

      SHA1

      57e248a8134196093145ab5eed42b5c439e407ef

      SHA256

      2184e5ac3326725cc969daaa820077a7af194b6663b6d5d7df5786109c52c097

      SHA512

      6cd5fc537a7e8e50e8b31d4890579042a1233fdb1b0a9d3eb850877f61899eec67160b589a87df9fb4f9fd3db97234cc6a4e490c88ecd2e4be79ef0aadf731d5

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\rrtanurkry.exe

      Filesize

      512KB

      MD5

      35ebe464aa17dead24bb7c84d227b86e

      SHA1

      6ff5027c7cd4bb62f30b8af06cbb9d99ccfa64e3

      SHA256

      81ea825c73d7313ad67fb528d802b29d513f966831bb4f847bc822cc8675ae03

      SHA512

      0a01b2df937d6a84d3523ab98d2ea8c9bee81cd220b3779fe14c614222fa49b5571a41c7984dc084caf6d90770270bce9bae79953d561263bb16e595e5a79d7e

    • \Windows\SysWOW64\ttooymyzurvlnel.exe

      Filesize

      512KB

      MD5

      c2a78c3bdc8a77438935e03cb616e58f

      SHA1

      5f532515422a7bc547b0aa1a419536cffd9add8e

      SHA256

      aa1fc602ca0878b54ce5cda4e4bca30d1dbcf0ee0868d75e950403eee1682e24

      SHA512

      7ce7622ccc742b84c6c7ca3a90f672c59b595c043ec6f0766ab94bdc1cfc4e738fc6bab85eca7d4e46f91d075497672db672a07d4070aaac538e17fb21ab1960

    • memory/488-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2824-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2824-95-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB