Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
731c34c47908d5078c87bcf5a85383b3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
731c34c47908d5078c87bcf5a85383b3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
731c34c47908d5078c87bcf5a85383b3_JaffaCakes118.dll
-
Size
85KB
-
MD5
731c34c47908d5078c87bcf5a85383b3
-
SHA1
e9b574aa6972fecdef2ce1bc689f8b69ee2afc8a
-
SHA256
9ff69703fd76346153269550ce1e47a2488f51118dce4fba2dbe0c37b62c04fb
-
SHA512
ff80e268a982e188e2ca37e021e0ee2b34d2cb53db34ee3fd339cb9c59beba5b4be806197f15f9c2996422660792797d642380b587ef4ad714f278a843762cbc
-
SSDEEP
768:aX8s6xwDEkzDju/XKQbNMYU/hGmRXyov:assDIXKSAkwX1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B} = 00 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F24D881-4B20-11EF-9BD3-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428140738" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B}\ = "Internet Service" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\731c34c47908d5078c87bcf5a85383b3_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F99D0C20-F8E1-43B6-AB24-3F16BFAEA77B}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 792 IEXPLORE.EXE 792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 3028 wrote to memory of 3044 3028 regsvr32.exe 30 PID 2100 wrote to memory of 792 2100 iexplore.exe 32 PID 2100 wrote to memory of 792 2100 iexplore.exe 32 PID 2100 wrote to memory of 792 2100 iexplore.exe 32 PID 2100 wrote to memory of 792 2100 iexplore.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\731c34c47908d5078c87bcf5a85383b3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\731c34c47908d5078c87bcf5a85383b3_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:3044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20352e14529a6c64f847c457403a944
SHA1f4b5f6a7a0b5c59a3b7acbeaee94ffe47f830610
SHA25645853638b9bc38e10b19aafa10cdd5f7898e2496fcdca935f415a7462c168053
SHA5120f65564d9b23de8703c46da87329b1190be58d7143c5cbd3d1988046cf27d79b3dd71183ddb7a5dd894beeb801412be011f19a0fbadfbb396fd06ab789f54e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d499c7ce8f9f50113034b421660476a
SHA177cbfef24a5a93b261169bfe5f19ffbccf4b6504
SHA2560ca4ff19082b03ca7b985e738a005ed656b6dc48d035ba71da343dd168bb57b6
SHA512e11498bb1a7c1b467580d9f6d38e057a6a2e6dcb7d448bf5b7e9cf6e69931e5c15048fba81f60f37129470dfb51fbbe5abe0238395d0929dea1e41a8ed047636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f103a16f7627c561e55601a880f5c762
SHA1e5b1713297122808f871f46ae73b727aa0436614
SHA2561a9454e0c64391fed024e19100adcf3cb3d9c3829eb91be1f751ca1ab638e7a1
SHA512e5bee4061281c9569e42a1e5fff0ede15736021d469ea00ffb866462892ddeb9e8001baa7a930ba2100f8b30c16ad034d70867dcc0d0eb76416c552328982764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8443476508f33268274b07a837fd46
SHA1171e717501e46f18ae1811c3db79c1f1cc062b08
SHA2564f8bf58206d6628a28bacf7f7cf49c8762aa48e47bfbb530de57985d639dcbdc
SHA5128bdf4413cb94cb23b81cbafb307fe5f5a73663e3c7ffb710a5c5beef8db90a0f038ac45e60cea58a5c281266c080f526e0ff06abbf86a40482b621adb469dba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe8fb2dcbfa32876240d145f3f6e68c
SHA1197c771355f1c551e3525511a51969c6aa8e54ca
SHA256e371a583540c6ef6cd7767ef5b7286f0801dc0292eadf9ef58c56a26206c6988
SHA512cc20a920e9628da70b29a84c4c7c245bc301746046a46ad62a1f5335d29a430e381ec66a3b1d42a0f6c6245287517cc7f0806f659ff90b7a96f48151660de16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5e2c70eb8de18ed353c2b04748d1e7
SHA1411c963b4661e744db2385557ce6c9336d440985
SHA2565cebd2eee0e2cffe9f9e4a1ca6f32a34ae3cd3d1c4354bcc8382be51b6b8f759
SHA51219e393b6b4777214789efb8e4c96c7585a959728a2b59484db658382fd2a13e716415a90f33eb9bae9eca9761fd794040083ef0728cfda2f8c015b8b6595987a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3ed52be84ef174c9787aee91ed5f39
SHA100a46856b9c3ffdb00c4de7561731e4e8af66f33
SHA256376436aec494250cf1138ec9213e63e496bcf89b1524ad0f4f07385311f37daf
SHA512132fe9ed7b5ccb33708e114ae84abfa0efb0303be0721ca6118f280af8f697b9bd5920381cd81c81606e4369d4dd2b9fceed29d3fa5fff647206bd3f047bcb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58671506f47064138268879ba71f7256f
SHA1e51ec27efdbda8fe7d740fd01bbc20cde9e2a526
SHA25607df08a80d5a36a733a2da2cd579dd3c0d1baedaa9f80c2e1b9e6233b78beec5
SHA5127c48860c61b846d00f8bdfc16f4df9e88df4591664c638bcf3bea737ad283917ae4e16a158c64623eff48975e3615b185c7b70c4c5043c388b08ebf53cba065a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ccd1b7f44bd6c0b4d0cb39330a1fe8d
SHA106c3b071c7a60790ce639ac0af7e4bb388ef3d40
SHA256ca7877ac151ea089b3f193e09f2f55a80b3f0d4745765a6c6a6a5bc68803d6fb
SHA512f2b48843c0c40942ed4ecf9e8274502012bdffa16512cc524c1b14d5b1a009e208ebf6848364bae88dafb34efff0e02bc424aaabc484d009a172d3c000ce1ea4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b