Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll
-
Size
697KB
-
MD5
fcce10c26770bd9f2c5ad6f16cd95f11
-
SHA1
994913ff98a3e36c15047b0c3ed269a5c4082d10
-
SHA256
cb960504fd796ca7ce5e4a00318a123a978e2585478464eddaa21aaef4165e1a
-
SHA512
ce6d97972a24d5d9cbbcb4de41eae3f0844ec9236867954663c3b3dacfbd343c9b323882d0532e949ca0ded0c2eb0284fcc9a1d05a407f4ceb939be691426520
-
SSDEEP
12288:Z8rnt0EnGRzNJphx+0Z314ypeyMZlnctm1g1HZ7Q1ujjaZq7g76F:sSRzNJjpZ314GVMZln4mS1HZ7Q1ujjaI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\moxlddiwuefxrnofd = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{20E0EB92-E3B8-D272-9C31-E148CAB28662} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{20E0EB92-E3B8-D272-9C31-E148CAB28662}\NoExplorer = "1" regsvr32.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1F667E1-FF14-11EE-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419779387" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20E0EB92-E3B8-D272-9C31-E148CAB28662}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20E0EB92-E3B8-D272-9C31-E148CAB28662} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20E0EB92-E3B8-D272-9C31-E148CAB28662}\ = "brincome browser plug-in" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20E0EB92-E3B8-D272-9C31-E148CAB28662}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20E0EB92-E3B8-D272-9C31-E148CAB28662}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 2088 wrote to memory of 1640 2088 regsvr32.exe 28 PID 1056 wrote to memory of 2608 1056 iexplore.exe 30 PID 1056 wrote to memory of 2608 1056 iexplore.exe 30 PID 1056 wrote to memory of 2608 1056 iexplore.exe 30 PID 1056 wrote to memory of 2608 1056 iexplore.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fcce10c26770bd9f2c5ad6f16cd95f11_JaffaCakes118.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Modifies registry class
PID:1640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b3661f7ea36712a756b9e650d4615e
SHA177d968b789d5c3d9a25b24eba7de3ff090c00b24
SHA256821805f12ba9e53f1523f65feaaad3f1c9f3b40fe1d7705ff1ce410e356509c3
SHA5129a9fb2c4c46d7c205a8ac04f1320f6e958c235935a3aecc696659e522c492fa29eeebb35017ef5cbde9546269178ff9c696069e2f48e60e0d7e45b9d9b228ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e190415cbc868daa21e9293c53cea5
SHA1fbbf2fb9684eb61aaa2a4c6b04e6ceb828a0785f
SHA2569ad23cf145c5e64c0cda32b96428e5f3815929f0f88ab18a2e0a92c3be496339
SHA51269fc1d156cce5f1367d839152d487ac67833af60defddc20379305d9fab895a4cbd514745bbd8c9ad586388544096a3b266f6e48ab1a0b0d4c79a1f1e5363017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f734b83ba7b0e6b1e7558a94688ac0ae
SHA1835a69bceb30f8909080a6fe886a1d87e7df2112
SHA2560b5065faed4f11e61f436edceef4afce2192aa641755d412058e8dab5b792635
SHA5122f43ac58af5cf3b322721023dae9637d8ef92f74667d42d7103444ef8cacb0ac27f29e0e6b3aa786a4335ccb220c4ce4735df4b90c90ae1fa66a291228bc8a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc3c8e0ae3edad129fb151ac2ceab5c
SHA10736be5d4d33371df37f5f1316e88bac0cfee72a
SHA2565e4493f21110ed51aaef7c26bf1331415a500330c36663e960a25d6546781442
SHA512c17001612d1494e875dc7868d66eef28ca7776bee6c5e253f1365b4793f44fba9d2d29c925487bd3b81d300fb1544fac9172ad8cf2a54a5471e0e6b89fd3e154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fdf935d70cc686791d3261cce8b55e0
SHA16361c9cd2f290cd36fd992d61db53accd89b56d2
SHA2566613e0413320a3bf238bc8ccf4865aa3bfa1128b64be6ec649a14fddfb844ce4
SHA512ca9d6a6b7c27e19db1f37ad6b52dce86ca4d859c3d9d3e96463e2c96ff59fee13c3e3238f717406111998d8054928f724d0f420fb7678dbe3006f56b434d32e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607299d334d8f1c572c9a7133b81f3a5
SHA18ef8a7ba3fa415a7c8d70004a8cb68f8ed125969
SHA256e4210fb9f4c90db02b2eabbadce0cff5f7822b80e995281e145f0b17c6bc9984
SHA512008b93e8f49ce5b8de1cf83a026aaf14fee6f21c50636ae94ef2c6a8dc3a8b477075a49933fe9a0702855c379fc130b4a14e353ba4f1a9e62982a68d9a4c353d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583306247afa7d62b3638d3106e8caa5c
SHA1e3a0a3489617c3e8553fdfee6b9d105673a48660
SHA25696981b365897c7d6544f105bcbc53b7e5c553b4c75c708ef6b3b70d75ba35f9d
SHA512b5c273af9d663e86f05f1f686a42e1f69ecfdcef15ea2984207191505127d8ffcac9b9995ca1a936ab60b96f3040363d211c3b4369b8501fdffcb2cb95aa1e4b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a