Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 20:31

General

  • Target

    176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll

  • Size

    378KB

  • MD5

    176bed80cd1808ab3cc906d344beb8c1

  • SHA1

    13b630b0ff9c07af279e894810903c357f44060d

  • SHA256

    4fb708c8babd5f2cc8057efef225c63ff5b5e8eac84f16901e5c92129289aab4

  • SHA512

    bd83602f795f0a46e2cc991d78ca306dc50bc9fe56dd3cba8031655d2ed137f6b8af91d88af43adb4b731fd8e2ddd4fddb19b016f5bed88686f6330c6ca817ee

  • SSDEEP

    6144:StE0VT6P9cSrJak1c659bBxBsbAh27CNvvjEvdnslHnPeK3iFlD4tCkhbv2s79ZO:StE04TrEk1c499x2b/+vvYvdnkHnPeK0

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll
      2⤵
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2136
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0632b492fa578e4f4232c5025d4c962a

    SHA1

    b19e3bbaa5589d348699f19bba0927904bc9135d

    SHA256

    1aaa9d780c96b5f7994b042d5ba46d412ffaec8cc9344ed4bf16192d91b9145b

    SHA512

    7d419c4d3315b74c29c300940e1b741cacde468f6f54cc547c911671c007da51fc1b7fec4ae9acbe8b87a5a3efa5516e52a09e6a736c4861e38ac4ce060d270e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b44460562ea2a8eed40cd50499b4641

    SHA1

    a4db84d9b666ec65f5b072daeb95dcf67f51812b

    SHA256

    c124ecbec6b0aff3f33c8d6f0131bb84dd3a662309b905e2aef9a0011c26af54

    SHA512

    9c160c51c73bc1713dfc6adaa70ef33f75edfe0068127e8901b2bf67f385c5bfe5f9e614846487a72ab80588fd107f262fd0a7d17704a33829d72d6b5ace2c27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbc6e7edd98fec59e9aaa091111d0fac

    SHA1

    e840d9e7d9bbad3adaaf4b94826803e5d065d68a

    SHA256

    e2d9d27f7ffcba22b61adb5623f1c8d436cad8e9b76ff2917520455c3f5be0b5

    SHA512

    467e64894d6131baf27d1659a1fdc2bbd5fa3e0cfb012984b4d21077dcb52543740e53e91720a1c3c5b3a32425d5252105d6e819f6fbe2992ec595a052d863e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bec1ba92350da3795469e95f2e78eaf

    SHA1

    356dce59c65f3b43894d50cecba626aeec3623f0

    SHA256

    646d4776cb8ab075652ffb822e80f6c64c0af4b42f30c4fa50e42cca82ad8cd0

    SHA512

    a4ccc1cbaa34ae26815e6287a81ef36e1aa566abb793a6e8250cd030e2596c3d1802eee83f51ac25af8e7a5737e8c7934006e8030067d27964fe5ee55bb18567

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e416f84b1885ca19386721587388018

    SHA1

    5bc1b89f59d5b80cd40f4b234b03dba2d184b379

    SHA256

    9dbda78169e910559a8198345524351cadaccf9b3bb5842a5fb301d962b22aa7

    SHA512

    f339a24c487dddfe8b18b43cce52a1bd3d7c8898014f2d953d3590dc56882e2f9f286a7afc40c58aa8f6e22bd572355523770bd5e32bffb847f4047cbbe1c784

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99d43ccecb16c08325157caa7c432c9c

    SHA1

    bb2400653f2e8768f5b316bc56106f686431ca63

    SHA256

    fd45c97dfad86f008592156c9b7d190be00c5b1c1a94d6fc3e140a9ab702791c

    SHA512

    b022dc3102a92f00bcdb1a7e35b3a75d2f53020a6a3f157b123ddb7ebf8af30fa96a989308b1ffa38151c232df9889713aeb92387447e5307d9a3b3e0e2f97e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7595effcc72286f43b0da9b1c0b8278a

    SHA1

    79fbaa8440692671dd3fad59dfc1230d9742fc25

    SHA256

    b944d00d30629a57acc3550dd59ece6f79a0e442b2c74b004a18decb6efddc7a

    SHA512

    d0cf89c6cd46d9dd0b685a466d92504d8a65c2dd45c77619e3cc0adbc46b307a4e270e19520e323e8681af99189c735be5e14f07d0d00c57e43e88b0a7a69177

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    197a9eadfbc89856b40e1431fce928e7

    SHA1

    1c92b5c6428a8940ace261f1dc2439aa85328623

    SHA256

    663e2b73406d35a5be6055b043c2cf57a6731be50b34f0750f0a12fab1efcf3c

    SHA512

    72ca63a13584237577bfca5b7aa0a7a00d79eab43194debbe2fbdae9aae128de9f6203144a479be0779b7cec7ad53ef824ddba181f9c165c6fa826c3a8dd1ff9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7709424669b0a27bf9d6db7ffd804ff

    SHA1

    b747ed10cbd582ba37446f6824fc546b98473849

    SHA256

    51965744c0dee32397bb1f4dba748f72dae0233d12187cc1d71d58d90fbac1e3

    SHA512

    5e5950be111673b08a4acebe8c38c6a9c7587a066cca10c17d08f93ff4e15b8a9476266c5937ac7b908e62b06d546282c7b1240c8121cd12618c438f2ae8441a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ab2fd74e56c037696731a15b90cef27

    SHA1

    7d6cf1ba0fb7ca99f4bd45df0296bb5b1d326dfe

    SHA256

    e3a471e100d556bace731b802c393ae3a161280c37a3f9c24d8f322465e7d3aa

    SHA512

    4833892a67080920a170bd32e1367cf5a14649549b4a0ec9780ea041246dbbadd183ebfc0d0cdd31d3d88d3cee46b96062df9a1a9e7de9a1df2702ccf1dc7bcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    041f35c8254c7640910e78d59b237dcc

    SHA1

    2dec8e1f4f71781937182aa522fc55acd3c19e7a

    SHA256

    df3ec4b1bc84bc4c79db6bacf19afd6e8a335c078f52e276cd4d1507bf84730a

    SHA512

    9afc313051fa6114ce61fbeed659a2cb5bf6999b65d3282de0d0f1ec49fa537286f619a8d71734ceca1208d951b4b8c7e0c0eb5d63123a955b5aec3fa4a38546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60d737f86204a53d8d0e7ea278a12aa8

    SHA1

    4e4e7a8d5881905f43b2e10e797d4065fab12110

    SHA256

    da666c8a915ddaa473cd4b44f33c136ea1b71d6e59f4d1a74dc51597e56a1bce

    SHA512

    0710ea288b84d54a3b5cff0c00007b11e870cdd53aa32ee0c44c23950bc4031f84aa32b87121202df4b1b3284bd3324866b522f72e8c18a295a216320fd5cb05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76e249f3462e50535ec3841bfcbfafb3

    SHA1

    baca32860b721a6b60e01edffb6d5b22495d7207

    SHA256

    8841609ebb2b74318c44f35356d2cd43cdad05ed5b6db544bb554c160b108696

    SHA512

    dc56cc8b700477d827a511cdecace0ce003041a6eaf23f5589374330f9d42411570d6c6a8aeb116425464fc09bd3cfb6bf37e6de6025f6e6805fcb66d8c45f6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4c57d3c505d8ff4217984d9bff4232d

    SHA1

    6f2ccbbf35c28d2eaa073315a11525542c166cfa

    SHA256

    d4c4a5387cfa20ee3cc8e2c507d6db68bf2373fdb5074c44f44f68d573ff2789

    SHA512

    22b255ac77f2d8a6c2d21bf3112a10e2ce2ed3eb45c7dd2da4ccc55b2669c4af2f65738bf24c5dba2c1801ef64942a23ac98f6d4e5540563b38e4a417457f95c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc5d7690cf0c271c74d70e3a4b43ccfc

    SHA1

    69dea41f13356edc422a2d074257101a599bac82

    SHA256

    e04e0aa8855fad3311e8c10b5b17b9b750bb2d757b4633c7b88e0e7dab63c513

    SHA512

    e932e108cff7dda7f1c1185896ab6eefd6feb2ce7d4c240e8358c1785d9314a9a9257c617b17865d8ea80e40873af6f462dbfe2c39b75b6758e71db57fc9c57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf34c0e9837154c5642b507617152db1

    SHA1

    50d46c31bffcc967929e343a43dcec0b6fcc16e4

    SHA256

    44f7a308d8c1479fc6bafca92d9e9f72d42b250316e359a69482c3b5a0e55b5f

    SHA512

    20e22ce25ddf27d6d5559557211a4797a44f4b89a6a5030af63ba57d12102b5705b1e38a62e8ec2f3b6715c5f26cdba39b3b7eefdf92486386f726c70c75aacb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b63e4a8608cfd1c3f7280b40a0790ab

    SHA1

    903ff4f0635aa711b966bd4bb3bf6d97a6e5a8f8

    SHA256

    71d9092ee9a0f0db1234301840c57f341d1a87aaaae13c015834afe0c1dfe41c

    SHA512

    8255e52acf9f9c0f7922da407771a527735010bd1fc1561812a113c115d1f43fd39cba07dd184c1049917098d335c217a941becd7b89848e1e3f0cc05886dd20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c4f73f3063026e6ae50af56a782cda4

    SHA1

    0dd54dac72f76e3df8bb403307be85f3e9f1a301

    SHA256

    19399b7c128cfcbf799e662bb0f0a801f372784a43f75853b865db2b71fd87d3

    SHA512

    77e672feb084c6b8a01ed3e342b5a782932c27ccaba5895cd3ad9ad4daa578219ece6b7cdbb138d205ecf4770e62a36ef1074609eafbf340b2565d1c6125c6d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddb755edd59307d36e86ae41d122340c

    SHA1

    761012870d7ba6d0072744f5fc75480b95d0bebc

    SHA256

    add97d4cc39964a274e35cb0558623233b39b0e0e85cf4c527ba55ac08a03bf9

    SHA512

    81b9e485c5b2769175650ce03afbdc2f0bad08b491b0a1a5e24af15a254fdc3e1a65cb4abf9364232ba2d4035f5121e0084a3e231ee44c1297a6c8cc58c4d50a

  • C:\Users\Admin\AppData\Local\Temp\Cab364F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar36DF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2136-0-0x0000000000200000-0x0000000000202000-memory.dmp

    Filesize

    8KB