Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll
-
Size
655KB
-
MD5
c02117ba26a5a6939e8d52277cba03a0
-
SHA1
6d18f05992c5ede3f7b28c70f7a5b182f4346f0d
-
SHA256
bf31563b962c8d66d4ca8a8740ac13c9a42016434f4f4de10b54cac7d1aeae52
-
SHA512
d8ea2185af8a039644f7e080aa58993ea39060bc63052781f932739abd3a0428cb8d9c4b66a2b06606a34037ea2d5eea5705d670e959fc4ea804b8467e38d7a5
-
SSDEEP
12288:eGi3UjPsczGwh+dHN6qSr5xxSIb5zxlNPP3zyp5Zb3e5nfQXZfX8zyY5TDZ+Wk:eGxzzFsdyhSozLZD45pOGXZP8WYFZy
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ypckaqeinyycbvfl = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{793DB693-F955-E432-8681-884A4914CCB9} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{793DB693-F955-E432-8681-884A4914CCB9}\NoExplorer = "1" regsvr32.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6EE16F1-62A9-11EF-AF97-4E18907FF899} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430728549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{793DB693-F955-E432-8681-884A4914CCB9}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{793DB693-F955-E432-8681-884A4914CCB9}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{793DB693-F955-E432-8681-884A4914CCB9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{793DB693-F955-E432-8681-884A4914CCB9}\ = "cashtitan browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{793DB693-F955-E432-8681-884A4914CCB9}\InProcServer32 regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1624 wrote to memory of 2316 1624 regsvr32.exe 30 PID 1804 wrote to memory of 2160 1804 iexplore.exe 32 PID 1804 wrote to memory of 2160 1804 iexplore.exe 32 PID 1804 wrote to memory of 2160 1804 iexplore.exe 32 PID 1804 wrote to memory of 2160 1804 iexplore.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c02117ba26a5a6939e8d52277cba03a0_JaffaCakes118.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbbba8312733b7e6b9bf5fc7265f5c9
SHA1902fdd2911d9086c6682d49fbf302789b50015d5
SHA256a62cd141ec05cd5614c155d1ba57ad2f79a65742fcb7a0662074a0ee34905892
SHA512d29d2318fb754ba9b8822c4fe6e95b665fbf1e66ceed7181b71517fbead436b7ffa6603b75a288dc7aff558b9265bda4f7f013af11cc7100b17d6d30a55c6de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54746784bfcd2b165ed857ef4dd59ffe9
SHA12af8d78e1f7fd13cf64f066f225b5cb12fa27aaf
SHA256d139a68fa0fd2628bc8442a20dd9f4f282544cbf4f1c26b68cd7fdced9e1839a
SHA5125df2c85c7dcfaaf3a6780c942b7be025e593cd97479e7a7539801450267420a6ceae364835c925a9c234f0330aff2001c6a69a108ae26ca2393b5f7e650871c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5780eabb3b234f21f158786935d926
SHA18e1e153eafd376b9eb28123852ff52422273a5b7
SHA256dec924d81296aac963cb0dcf7fa7a0e1393a42d7eee7a8d7650af8ccbb722f37
SHA51236dbb7ade730cfa57ac9cad71c5c333c3a44fd8a436ce0c1b45c8def1a16b3806e05c0c6938da7517b30b47d8c4282b29cb64408bc064ea6b7c98def0ec13a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c08304d91693f0d20f5efcf50d2d960
SHA1506a1fa5e3f6b74e36495bd0773b0d8bd0eb0e63
SHA2568614407366527ad540c906a96d33f94a7ef6f54f77f111e8f035268d7f415312
SHA512a34ccb764e3f9c15f014a99f268e37a1e9c68d3144af8e6fa7762c5b4de4ad4c4902f4581ac44e62fb965ab6258ef0c76a58e3cd2d814c9cb138ccaa6f449649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0479dde7f5fa9fa6ec8f52ec02cd70d
SHA116a906d0b0fdd9f67f62dfa7c9d0dff59109fe7c
SHA256f8e9a080d0231fb28ef686f0c205bc80779de09049d11662fe9dc2bfff1efa42
SHA5122209b218b5873f73eacfa36e18f3698facae2970048ab1353d96808bd95617cec5c5708bb1ee183b1dcf79f4b2f70411d5e52a6067abd583a3d689cc737a97f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549abdc2436a11bbc014ffd3322a732fe
SHA11565eebac638ab5d5b5ee76cfc130fec79aee791
SHA256cae31e1ab695c5b0b6a35a7ff6bf12274bf0e5eeac22409b83020db1365cff78
SHA5124f0356b5dc03f4fcb127db455f4540662650e21a2f2d34431db5773b14264d49719dce9c7561c9954fac7cbc7fa64bbaa2120f9f6a2543ad9cae3e0114a4d886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd6a7d8f4849c4e3db0e76084d87cdc
SHA10e337afc17887760d21c83c7c7ccf69f89ac7f12
SHA2568a6e0b40e6aebf1286cfc55e587d50b9fedf880667df0fb5d1d7e3bbb073a8a6
SHA51223aadc7af4af36d5725681710bfc8db430b29ca78d2afcfbfe63e461516c5adda2e28c1542976b93c1bf119bef3ac8b770beef641442e62e7d760f9707422335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b68447d3b93d312d1f68fa29642611
SHA1e7f5db15bb01b01186264a8a90a8c19fb4752ac5
SHA256839d1328309cc73646a2d35c507429ca89264e7f6faffa7ef606e345baebd36d
SHA51206ad589fc5832c25ec23dfd35bc62692ebe09d985188cf8dd39363e21f7110e3bb91459b168b84c6a6c8172fe428b29f7004e8e815d0e1c143f828839f188ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510234fac494d74a4fb15fd02cf734949
SHA169c6241b004353978ee159eafe22c4801945a88b
SHA256b07168a16f897eed7ae27b44b0177c5da18c77c2f10897d3632aeb78ea0448d4
SHA51255c924901545e4b59d2dff78e61ece145764b5788ee495d426776f8262bb38c4b3adf037ca8f51432c98894a5c63cdcc6a211258668de4dea7400e00f201fc82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b