Analysis

  • max time kernel
    150s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 08:21

General

  • Target

    2dd31c97b7ab68472ee856e223b6b393_JaffaCakes118.exe

  • Size

    255KB

  • MD5

    2dd31c97b7ab68472ee856e223b6b393

  • SHA1

    745b9f02261092e1d10de96996e55325356aff20

  • SHA256

    74f21332c7c683c24a94d62638cffad3d2dfd950002f3417439e2245d09a8ae3

  • SHA512

    f127d09cc2ae3c519048d1f29617aea4f669af7028d6487843d628f3117916e69eaf1433ab680276bba954dffadcd1dfa6afef7349e57eb12a5291129968faad

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJY:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIn

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 61 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dd31c97b7ab68472ee856e223b6b393_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2dd31c97b7ab68472ee856e223b6b393_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\mckwwljmek.exe
      mckwwljmek.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\SysWOW64\auxcagjb.exe
        C:\Windows\system32\auxcagjb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4708
    • C:\Windows\SysWOW64\odrzvuphwbebbpb.exe
      odrzvuphwbebbpb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1988
    • C:\Windows\SysWOW64\auxcagjb.exe
      auxcagjb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3148
    • C:\Windows\SysWOW64\ajskujlxrpuuw.exe
      ajskujlxrpuuw.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:936
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    30b4ee6ad00e86399b8bbb4d362c9049

    SHA1

    3aaa3a083a12ae77442a7ec54f70dfa3e6b2833a

    SHA256

    4fb173cf4255f889925a2de5bef69f1cdc46fbf4d4e4fff88dcff7e584765aef

    SHA512

    f1fe5719ee60ea4f15de13b6e21dca104248ffb980772c719703b7054a97b752185b6682c771d8f3522a485ca3517a8d639deab38b659dc41c218ee0b231bf26

  • C:\Users\Admin\AppData\Local\Temp\TCDAD11.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    245B

    MD5

    d905b42072960fd0806cd656a6bab995

    SHA1

    56415566a15fd1fdcc06e48784860c5c9c7acfe3

    SHA256

    8204d249a42562880fc53a26662fa255f84517dcfdf11b7899b59f3292b0b38c

    SHA512

    c6bd2794651700212dbda48cba11d8342ee2637ec84176895e3db70bcd9b3c6256eb541012350e3f01d446e4d5d1ff87c13727cdc3a3c268556d05faf2f21df6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    5768d8ec902954cf68fc1dc8a1501e05

    SHA1

    00be9d29f9ce674119c3930ead76f33fc3b72c95

    SHA256

    9ae89cde045d7a2e57998cb261c38d308c7aa3f023d11b820612439e43931be7

    SHA512

    e04f654371a2759d26fb7615bbaca751daa51ad64ab0042175cc13a37382f050502c59b9c6c0d625487ee8a18726e4b6eef16a58e26bf8b0957ac302a02f7ff4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    9419d023205b3f5a3909b2c143177e92

    SHA1

    a5d8319103c85632a921adbf519029e048b3a9ca

    SHA256

    2e5b9b458cb70f477460b5606e7401d8343810b46b9193bb654fadd31576b508

    SHA512

    ddbb6c22ef1c062f89f6bd1eb2401a7fb9e116eccfc77a4d61c7d36db3000441b7bf4ea8ecd0315de2456bdd16bf556e670b1694a00c18613a49176ff2826c72

  • C:\Windows\SysWOW64\ajskujlxrpuuw.exe

    Filesize

    255KB

    MD5

    a92121851012782b88a300760bc9b091

    SHA1

    0a309fc174d5ee11ad89aa2be1d4620313dc5dd3

    SHA256

    5c428a927bb044b7ab2c40bdc43c68ebba976be6ee8fb8a399c3d3494eefdd4a

    SHA512

    6924560bf484e473732511ffe408610acd5567d34ef1fbbdafb1a9c86f16b02929577944e9f92b3059af1ffbf8daf15e12342cb63983aeaa71ed5b55ef40960e

  • C:\Windows\SysWOW64\auxcagjb.exe

    Filesize

    255KB

    MD5

    3d03172456922bbbe7caee23b8bd4bce

    SHA1

    722d7df66a9280c6653856afc217d5625d063f7c

    SHA256

    f214002874c4b262bb55d5b1fa1e5147622bc94842043fd64c3ab6460e27c1a5

    SHA512

    5cfc5429fbc209dcf84dff3b2691da7c3fca3c11cf726aeef61c426aeb25271122b62a18ba650c31237268688e8b9771843b081c84d7eb88454a6d85bc74aef7

  • C:\Windows\SysWOW64\mckwwljmek.exe

    Filesize

    255KB

    MD5

    53a200d612fd20e3e7ba7eea69186691

    SHA1

    7b4b1d2f392dda7fb78bf6aae8306d580bb19978

    SHA256

    7243ee7599186def16cf12c69dea11bf1f7f2dbce06b4ea86d674cefbfebfade

    SHA512

    750ba97ec3fd5565e2503e2436dc381d525c711f0074d6ad2dae8921e59ed8f5510ec9b1a949dd3d40ede061b342bf68ab014f0d1bc05dc039811a47bd1faf08

  • C:\Windows\SysWOW64\odrzvuphwbebbpb.exe

    Filesize

    255KB

    MD5

    c03f3163424dc73200fb8842ed14a056

    SHA1

    0403906cc7eb7b10c9c372a3af59822b7e75a7af

    SHA256

    5a1856842f77f9847f7b7345a9533f2e30a7969566a75f2a60b88ea09ca94263

    SHA512

    d34c9b0a784516572e9195b43a8dce0c7084193e37c5d4e046248b7cf9a060ff020b966db1651b910f7937e14e623c2126c36d9c6cbabf4de110539837d12cde

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    2359477c6de342287a6e92c869bb64d8

    SHA1

    34da07e4ddade887d31a64967a742f7feb6f8876

    SHA256

    4708b8e861e62afd6dee7f27e0a9d1d87b1204bf38cf9db94219f8fe21db8cea

    SHA512

    8d55a0cb55c38128df34d2e43b5ddc2488a0de0d62de7cad1e49fcd33e40d053d82268feac9d791bede3ada31e8f891297632dad2312c91e01cfa2079606e7a6

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    2bb6dccb9a23e0f624c0e8f0b7e127a4

    SHA1

    ca9cfe9a110d53e491e8687045d63629bceb7fdb

    SHA256

    0712cd516ec5f5f7a8029f926e5a0bad819e93e3ba5ce9141492f41a175ef1cc

    SHA512

    660304f2dd908f37ee58a24136c6b86465bd9de8c9b5bfacb3afdf8c1adc7e97ac97a1657ddfa87742d2004293c024304f6deaedcf7bf1fe374f318abb8efa4c

  • memory/640-0-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/640-37-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-621-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-84-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-612-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-624-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-627-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-630-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-604-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-615-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-599-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-633-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-594-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-636-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-639-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-33-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-642-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/936-88-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-591-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-610-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-22-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-622-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-625-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-619-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-85-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-640-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-613-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-637-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-596-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-628-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-631-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-634-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-81-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1476-601-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-82-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-638-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-602-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-31-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-632-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-629-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-597-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-623-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-635-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-611-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-626-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-614-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-592-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-620-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-641-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1988-86-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-598-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-83-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-593-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-32-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-603-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-609-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3148-87-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4584-39-0x00007FFECEDF0000-0x00007FFECEE00000-memory.dmp

    Filesize

    64KB

  • memory/4584-44-0x00007FFECCC20000-0x00007FFECCC30000-memory.dmp

    Filesize

    64KB

  • memory/4584-41-0x00007FFECEDF0000-0x00007FFECEE00000-memory.dmp

    Filesize

    64KB

  • memory/4584-38-0x00007FFECEDF0000-0x00007FFECEE00000-memory.dmp

    Filesize

    64KB

  • memory/4584-40-0x00007FFECEDF0000-0x00007FFECEE00000-memory.dmp

    Filesize

    64KB

  • memory/4584-43-0x00007FFECCC20000-0x00007FFECCC30000-memory.dmp

    Filesize

    64KB

  • memory/4584-42-0x00007FFECEDF0000-0x00007FFECEE00000-memory.dmp

    Filesize

    64KB

  • memory/4708-605-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-89-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-600-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-595-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-608-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-90-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB