Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
7222364feb5725509e2a656f5011bde8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7222364feb5725509e2a656f5011bde8_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7222364feb5725509e2a656f5011bde8_JaffaCakes118.dll
-
Size
85KB
-
MD5
7222364feb5725509e2a656f5011bde8
-
SHA1
ed51f26895d571b0517938a4cf749889a8bc354d
-
SHA256
00197c1e1eac49c7289add6409353f52937263542129f5fb682e5afd0c9d6f2e
-
SHA512
bfe41375180fb65f3405e4cc43023546777e3c8e43dbf3a7356dd03fe8d63801acf5e061d176da6114bb19776d3c7f18a9055fe5b1d9030280d9ca705f75347e
-
SSDEEP
384:sCh1RqOhALMQ7nUJHd6ycGHZIVRKFKFGCEbvQOIlYghe106emRXCG2:sC1XhALMQQhdaXKlC/OUYXGmRXB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{3BEBF2FE-7248-40E2-9752-8163EB6C4038} = 00 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428121740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54A1D3B1-4AF4-11EF-B161-F296DB73ED53} = "0" iexplore.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038}\ = "Internet Service" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7222364feb5725509e2a656f5011bde8_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{3BEBF2FE-7248-40E2-9752-8163EB6C4038} regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2092 wrote to memory of 2240 2092 regsvr32.exe 30 PID 2812 wrote to memory of 2780 2812 iexplore.exe 32 PID 2812 wrote to memory of 2780 2812 iexplore.exe 32 PID 2812 wrote to memory of 2780 2812 iexplore.exe 32 PID 2812 wrote to memory of 2780 2812 iexplore.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7222364feb5725509e2a656f5011bde8_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7222364feb5725509e2a656f5011bde8_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2240
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc837c0382e0d89c3c57ab6e5f80275d
SHA14fea9952934eeeb5d3d324326339f1275981b3a0
SHA256b1b859ac5b37c738c2ebe0c7d19af4294a8fa7c6db435957ba854b8ffb66c0d8
SHA5123c4f0ef2e43ad85c58308e6454507513a3b4f1fbea88dd138ba942d1c796cbb387cf97d47c46bb8586500f61193e96e396703c05a821170a5e532cfe1b708a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513b81683014d3829a1e440366e7c5ddb
SHA1cf5fc91dc914d304e39f60b1c2253c34d96b8e77
SHA2566a7c713c5ab5e40fa0ff1d38b0c6a10cea2eb893bf5a1468ff39c0c19507be78
SHA51209c7a478443385156ac03cf21f55006d5053dd0f904ddb1764596fa79a47e05a2e5886871036f12c090eef79cc1313749fdc2119b9eff066d1c8262abe8f8963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586da73e117fc7bc6e8ef7d261ae12a68
SHA18daf5efdf0e2642f2a8f52933d9b7aeba2496cc4
SHA256fc3281dd93b202d53ce2022d9883af26e0a860564d3f74af578133ec8d4cf84c
SHA5125778f31d0308af253b3b6fdb8850d28559c2432820e7f1796699feb695099e7f11443f15f600af06b661836ab46f46b07c1988d38f3a53315537cc2070e26a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516394e86283e2d1c2180009bda41a504
SHA11c7fd371663a64da2d05f6b10fada403a3243d83
SHA256ad05d70a011903199dac4846b09bb572c3bdcf8c2c41d603f2444aaf29168cb9
SHA51239ad3622c0927f39e66fb55b0a9130cc0bf04e4eb555ab166ef7469517441103310aa09658079256547013616c1091a539245664c376caabd6fb24f7c025cd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f96565b532624777b258258f6321039
SHA141c5cc65fca41b975425d826cd2fadab952028fd
SHA256fba0953157532386b7ebdec9875e2add9b367757f452a9c6b6d2b378bd54ea7f
SHA512ff02e79567fe6679cc5e67aa9f9c0793c70c513078457e62de42d5b29b2fd22131236621191d7414e501871fe42eb6ef81020f8955768e3102b5c5756a3bb044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bffe26415de8d1ed4bbff2a4983b77b9
SHA1bf63468059d945810ecdf1ec86f6a0fbdd0aac9a
SHA256e37e9df637cee1c7508624ae85aded3c1ad98f178f913e29a9b41c0ea914100f
SHA512aad1dfd94f957ec07a2d49954472f5d843f60126cb780fa354fff253c84e6d133e71bfcf45ae189d482986b419e47f2d5ce7edafd7a870a10077cd17c3b0c039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fb4aa3f5d94bd736d0f7826a1352c90
SHA1dc6645c5269affdcbd248bf834ec33b0fe8c4d9f
SHA2565a28b54494ba6d6976476a3da910967f52d243cd473e9378bb9cde0bd8be0f53
SHA51223b71bbd73d57fe6fdc12dafd18611507c6ea2b031e4443ad5c839ca5c43ce5c28209aee8c495b6cb293d9157319e743a72d02c72c998a9194b7221351372794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2f4d7209c0d395e8ab729267b4af403
SHA13c74e20beb03c6c238075b2d63185afabbeb06cf
SHA256b81254b6ddc087972ab506fba368cfc64f222f2cd44d2547060f2f6d3fae734e
SHA512ea9474cd63bb4bdde304b2a53e6c37138a38a01ff5681ec0c4f0097595206c5f30a0721745a3b6c06af93215df868bb577e4c541cfde93375b144763dbba2593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a854d2ea88cf99177458654c25d3bcaf
SHA1e6f0f14b9c7c1d9977757a8c71d22de059aba075
SHA256ed758763ace00060f3fef90687aa115f716e29c040fa953ba4c390feadd30ccd
SHA512aae6622cc8e0defddfb2d7d7cd230cecd5e24bb427a3ff82694d609be0fdfeda9cf4207de801ca92b3816cf6392eb35326706b59e77c195fc61831d5d4d919e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b