Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
82d604e9d035a507e9b07bba494a30f3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82d604e9d035a507e9b07bba494a30f3_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
82d604e9d035a507e9b07bba494a30f3_JaffaCakes118.dll
-
Size
74KB
-
MD5
82d604e9d035a507e9b07bba494a30f3
-
SHA1
c6fe099cf01ead2b1a7086f882a51464cf13fa49
-
SHA256
405b632ee730d2613e75ee9bde45db60c5197242a11a610f80cb7b249fa6a199
-
SHA512
c9ba1a3f1dab434a0b2bd7a93d957161a018960f0125fab338c506ba738f9d9b445ffc9f68e190cdf9247f2291cf6e3766b36f383b4c1ec110988b63caf3a460
-
SSDEEP
384:bsh20qYYoYFljyo2Ozd7RV5MjK743ob5KHAvQBdyhe106emR9R+x26:bsh20PEljyo2cddrMR2KgvQBdNGmvu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{8113B5DE-F7EB-4154-A311-497FB80D8BD0} = 00 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{816A4C41-507D-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428730413" iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0}\ = "IE Custom Tools" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8113B5DE-F7EB-4154-A311-497FB80D8BD0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\82d604e9d035a507e9b07bba494a30f3_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2256 wrote to memory of 2964 2256 regsvr32.exe 30 PID 2252 wrote to memory of 2120 2252 iexplore.exe 32 PID 2252 wrote to memory of 2120 2252 iexplore.exe 32 PID 2252 wrote to memory of 2120 2252 iexplore.exe 32 PID 2252 wrote to memory of 2120 2252 iexplore.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\82d604e9d035a507e9b07bba494a30f3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\82d604e9d035a507e9b07bba494a30f3_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d84827477b75db1d9f3fee6061f454
SHA192fa3463d9f1b087c168b6337bac8c1e82bbb052
SHA256952a60bbcebdabe58fe3d28e729e5d97103ebc4305a97e8ed3fc386dcdb78b9f
SHA512ac93f8e9685e31af13c5c9a5cbda5c3714ef44f90fa12ac0a1310476d04fb7cca434edf6526a45ebeda682c49c97fd85e4225ac15f5fab873ef52bfc8f530d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5e24100c24bce61b39977fc8ac7436
SHA122f19f593511ac8265e9d25abf6f437896babfbf
SHA256cf921d1e8b0a1c98217c98f384f8315cea522bfa3a63787feea5acc2a17ed05a
SHA5125c15459a28acf1d7897cf90f2b14003c0221335eac0d074bfcf3a028df0152c06d00144420d5ade52fee25868b34226176167fb83c74b1e87f9a379056dea226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e7830b7d590994327ed754d15cbbb2
SHA11c34c2c0d92574f3ebc10cf70f81971eca890ddf
SHA256a262edbd9fd2c39663cab1169ef5a2d5463ddc3b2c49db59c082129284097dfb
SHA512b0374aae284b5acc17a7837ea4d935e74a0208cdd4d78a2eedf61ce6a182c7bc4310e9231ece5206cf24d9d4bc86f8c30d789687740b14edbcac823f413d48b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d738f113c021605c18b7c802a6df70
SHA13b448c12f6db3418b05bb278449b08f1d96409a3
SHA256fdb7dbfdf66ddffdf9fbb5a6eb70d0651841c54bdb99e5752a84fdba653865ef
SHA5120c7ad7d29f7339901df24bdc84e2a29bb9f22cb99af0ae66f073ac8573990d5a44bd38efde19a0752fab0daa8779a5937a6e46fe8435896814d8066283f4b72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588811e67df60b09fd016b750a714346d
SHA186adb9b5c9f1b25a6f7237584929b9f7e2f0425a
SHA2566fec274dac9d9d8a12831ad523d9bb50194ab115336e25687b3d3e037e051ca9
SHA512b7f069afdf6e8a6c0f9f37e7e39dd669f78d3e72ed4e393393f7bffedd567ee803b6565864cb4bd91c449b499d542bc517347cde9abda08f76d63d1ed5ab56b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5b23208a061d505185b6e679721868
SHA1f73ed4c500537e1eb91e1ad40bb45d625f5be9c2
SHA256bc4ffb23ebb161db5bbd28ec13b3de215297f7c43648b6230c402a4cb3e8a7b6
SHA51217d12105bd03f68a58298c1843e1b03985ae07abc094183f4dd5e51e7c458b8d3a5d797510bf681e9cc242986ceb2bcdd1b1f6e8a8e50c3da17864a9e0055122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248fea7ee8c6f4b2e5b12dd91a141efa
SHA16a4e5e658ab3658d08287d33ecce5f117c47bab4
SHA2564637dd08c31ec90662b77bae76b385d6d42a8d82d3e3b4c47099f094fb35ca99
SHA5129ff63829efae595a0813b2e685ac6ac99c74aa7d59da8ee13d9ea0a141896476fbdb63c60684a83670e224f5dda35954a52be3c53f6e5fd701552b806c6b50fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f21243412deec64730c77b90f6096a9
SHA1d0a278cc6ff956f22e89585a2365a867f816f447
SHA2564a63e0bc8d8372e667a1cef6e6d4da55d8aa31f151bbdb89fcf7ecad1b79c235
SHA5121b07e97cddb8e09ce376942d45a73c3678d3ef4024b4a2cab5702e281cd75dbe1f4fb628c13327d1e37cd56996a12d3484e28a1bf1167ca3a9685a314afdf66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d578fa7bcf998e020e448828de79593b
SHA1c48ea081b33ddfb2887dd7d86c2dc092be30c02d
SHA25604b114e18382ec3f82d5271ca513c3e3cf653f112b98f31832db84c474ed8358
SHA512ff0ac624d2c46e95c5da6b50c5a0c4c98bfc94be1723b431afb7833873b756b0544026d09c4ee36399cba974e59e1305e0f22e9cea63b08b18c0e08501cf3c63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b