Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 09:27

General

  • Target

    fe3d7d637b2b8f9a2c0ac50faeaf42af_JaffaCakes118.exe

  • Size

    512KB

  • MD5

    fe3d7d637b2b8f9a2c0ac50faeaf42af

  • SHA1

    1808d6a66841243fdb04b750738bf5d388a4b681

  • SHA256

    b16ba024debae38dd2dfb0d258cf6016f676c16323b76e22ad0fa5650e63d3cc

  • SHA512

    4a8d1f897e871e8182709ae0f8dc205ce834cfc7d0643af7ecf7f57f9e18b54ef70ad1253e8f910a7de1eeddb38c75a8a5d27ed4678fb416306300c71c4df883

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6N:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5E

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe3d7d637b2b8f9a2c0ac50faeaf42af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe3d7d637b2b8f9a2c0ac50faeaf42af_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SysWOW64\fdrgbqstel.exe
      fdrgbqstel.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\ruynfytj.exe
        C:\Windows\system32\ruynfytj.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3860
    • C:\Windows\SysWOW64\rmnqmnsdthgagbn.exe
      rmnqmnsdthgagbn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3200
    • C:\Windows\SysWOW64\ruynfytj.exe
      ruynfytj.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2636
    • C:\Windows\SysWOW64\zwbcpvqdfqcyg.exe
      zwbcpvqdfqcyg.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4196
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          c7573d7fa3da95518f4bd3b558ad8642

          SHA1

          224bf0b25c6821bc53363351ffc8d02112b73608

          SHA256

          9130f74ce6a09b2d5b3b2c26976ecb0d39a7cd46179a4f06badf30c0b46bf464

          SHA512

          cf499f67af4e3cc3918e4f4bf4a19a6d2d0593ac8aefdc89ac0c5b5c32dc1f4f176bf95e05123041fed919bdd67310224a1cde5bbf395d7fab890572b854dbc9

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          a7c905cadadb9c8ce434c21cc371ccc3

          SHA1

          701f1f2dbdf8c575cab6ae1b4561c8780815e300

          SHA256

          9d217813ad6b4f1cadd3a1d999b32cd1ed281a6e9a699c9a626fea43c7cef954

          SHA512

          7d37e35e237a0899d1b082df70901a0aa4e682e9ea93d7f7dd59d9b71e961e96cecdea88894b4dc04c0a66f19ec391db35f806a52335ab5e4a6af9d580e645bc

        • C:\Users\Admin\AppData\Local\Temp\TCDE70A.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          423B

          MD5

          505ce61a856e175a4d7f9ca1dcb1eb09

          SHA1

          7bac553c32587fad729b783516f49be2db3b4fd1

          SHA256

          c9a6130c43afb8a99fac3a0b9dbb063b17d78d32306331d017a95336fb58d29b

          SHA512

          c12df2a6f5d92e4feba18f060a923a76079a34470ffa0ea64732c5a1955d9d591a826093e46f80beed5c26dba56d21766743eeecfaf696459dfde28960f7b44b

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          16B

          MD5

          d29962abc88624befc0135579ae485ec

          SHA1

          e40a6458296ec6a2427bcb280572d023a9862b31

          SHA256

          a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

          SHA512

          4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          70d2156500e498dbe4e511910ac0decd

          SHA1

          0f9939da3f2ecda14e83603c2f55206a8e515ecd

          SHA256

          4768008ac83c8c47f1f8aba277d5dedfa8891df62f4ce065e2778535851c06b4

          SHA512

          c25e8845df958b9bbd3a1e441451b913157e0302f5b235ef0edab11de8df3abc38f0a8c34809abd32889c6055db703902bff79d26bc1781494a2c5e62feefc6b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          cd9238fbac53a4d4ee958c315a3eb510

          SHA1

          8ed0a168fa52dacf2a23843d5110393f16a08445

          SHA256

          a64728654d889504369ff28471b2258c59eabb5a7ba29c8936c384bb33aac74c

          SHA512

          5d019d84929509fa434bdacf93b5bd8e92c42404564fc509656596d9ebbd24d64ed455296d58c9f56092f845ae161753d6eaf417c2ab43be331891a807cad707

        • C:\Users\Admin\Documents\SetExport.doc.exe

          Filesize

          512KB

          MD5

          ab055aef4272caa64f8acc74bb7e8c25

          SHA1

          33ab1dea5dd476ad9050bf17bbc21febe2310dea

          SHA256

          fbdac64d40125d5218fe05a55e88c65a8f58b50d3c66f589d860900ea7dda511

          SHA512

          2a4bdfe26fc4f89819b972088ec7d168ffc60e08e30f0bc409fae3b65589bdfd8eacc6550210f0dbfd5d233ce8401b06616a70133e0839a21e5645fe41db28cc

        • C:\Windows\SysWOW64\fdrgbqstel.exe

          Filesize

          512KB

          MD5

          05687b3cbc3006acaa991cc178353684

          SHA1

          833c47c75ee9475f5fd7d812a1a7ff27a5dcea8f

          SHA256

          ab97e1dc8b2d6be65027324ac9a364894dc0d56b9eaac89f1a11781eac0abaae

          SHA512

          702db16fbdad3a8d45637979897bdef7d24b0a21835b51fd9a2d937bef8e267cd4ec928d3b22c1b54aeedc18c2e489e5cbb5f3b01c7198644a1535f4f2c0358f

        • C:\Windows\SysWOW64\rmnqmnsdthgagbn.exe

          Filesize

          512KB

          MD5

          d4f08d9bdd0ca6ccbd66b7385a49b68f

          SHA1

          9b6a7a074527cca029056467bed7c0f98e660f6c

          SHA256

          a7ff7ff49daebda0975f16a5c3abe4c9744acbd16785d34341864f70ce481c44

          SHA512

          2fb2aad14dc5a6d7e463a819158c35e1a3b08c1227d2d9480b811a82374a7dfbba5aee2965d41c0b3ccebf32bfa188335d52e401583b9373ead1e2f125336ce6

        • C:\Windows\SysWOW64\ruynfytj.exe

          Filesize

          512KB

          MD5

          8b5d57270ff98af1beed6eff40a6b5f5

          SHA1

          fd1c4bc324015d97b530dbe572cfa434770519cc

          SHA256

          59673daa71153c9e6a7f4d81ffeecb4800a9e89148d70759a314972fa41baac3

          SHA512

          d54fa4409deb46a4bc73c1678d32dfdc75d64f99ae160900971c9c0771f45083dba814cc6ef39d2e77a66278fd260af8b3b7e82dac65447cf80a1c75ecb106ab

        • C:\Windows\SysWOW64\zwbcpvqdfqcyg.exe

          Filesize

          512KB

          MD5

          02a180d77d0c11e31acef7d10cc01738

          SHA1

          03314b84c184ba618ffa38fe7a74f9edc8d96241

          SHA256

          487eac463a8521a9139fe3c4b3da8e9cc60fd4985950885f375c8dd0beafc063

          SHA512

          f9015ada9ef4c268b07c7fd5fea38e194289d7a722fdf35be166e69bd6286902713ea66e77f9397b7b1062019a853bc15b126bf372466a3c34fda204f41af922

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          ba1777b0ed17af050c0ae1f2dc5a94d4

          SHA1

          8d3437904567f32a26f89d2f5066f521d39e58b4

          SHA256

          4e443bcd8445e940b433153b85cdfad5a87b5ac8eb883bcf944c2b079e2439de

          SHA512

          f0bc35d18f3e308da0f7394c97f5fef1ca95149209b3b874e72ff2af1d16b01f005c8a137972785ad6b43114f8aa61eede5ee537e5203738e0c31888d9a92899

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          60078011bca606268eb5e9746c9a6fda

          SHA1

          3deb4f098643eca279b950725c17088316183820

          SHA256

          66ce4c7e82a16b74943da39f930675e81c38a1c17b86905b21fddbc029ff8c02

          SHA512

          abdee5c50e9bba9becd4b65e216f8651d13f1781c3fc8638146a6d7b6b9ab3a29a98f5103033fe42006f0a31386e27e48a087a140df9b5d2188a745444156c5d

        • memory/436-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/4008-41-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-40-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-38-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-39-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-42-0x00007FFE210A0000-0x00007FFE210B0000-memory.dmp

          Filesize

          64KB

        • memory/4008-37-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-43-0x00007FFE210A0000-0x00007FFE210B0000-memory.dmp

          Filesize

          64KB

        • memory/4008-431-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-434-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-433-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB

        • memory/4008-432-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

          Filesize

          64KB