Analysis
-
max time kernel
110s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 01:23
Behavioral task
behavioral1
Sample
d56fb70c222d0ab0fca1312d311e52c9_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d56fb70c222d0ab0fca1312d311e52c9_JaffaCakes118.dll
-
Size
704KB
-
MD5
d56fb70c222d0ab0fca1312d311e52c9
-
SHA1
8ab4f96b1f809bd42a54e042c5db65d4b42d3437
-
SHA256
a8226d056b768c6b007a851f7d102122ac8abf1ef3bce53993c33daa9c7217aa
-
SHA512
3b2c9dcae50138aa91ae98190f39e819eb47f82d134b8e7359031567a2e06cfc33aeb57cbb5e23a3b04394a5c961722a9b160a2009ff56d935e2df99c8cf74b9
-
SSDEEP
12288:QMQYe8mAX8k9r1s3rOfwvUKKvbwhG4BDKhcs9LqgSfn/FcE5z4mzY4Fzf/3vjhjE:Q8Lpsu1s3vEkoaDKhcs9LronNVh4m3F+
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 10 660 rundll32.exe 12 660 rundll32.exe 14 660 rundll32.exe 15 660 rundll32.exe -
resource yara_rule behavioral1/memory/660-1-0x0000000000AC0000-0x0000000000C6C000-memory.dmp vmprotect behavioral1/memory/660-4-0x0000000000AC0000-0x0000000000C6C000-memory.dmp vmprotect behavioral1/memory/660-3-0x0000000000AC0000-0x0000000000C6C000-memory.dmp vmprotect behavioral1/memory/660-2-0x0000000000AC0000-0x0000000000C6C000-memory.dmp vmprotect behavioral1/memory/660-0-0x0000000000AC0000-0x0000000000C6C000-memory.dmp vmprotect behavioral1/memory/660-21-0x0000000000AC0000-0x0000000000C6C000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34382A11-6E4A-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0049700b5702db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006f2ddbdde4f30b359d0342993d08e32af3b8717350424d591fe19e1cab6c97c3000000000e8000000002000020000000b8d0a79a6b7a7e081bd3515bb68e0b84202c9ac981d7e899a2d32fdd208f2b4420000000340af7ac096dd7de7af3b957b5637ee1bc2c6fefe2ab01ba183b5390901e7db0400000002c9cd44f38a43162a0fac2e3bf7cc40f81bd2b88edfc9bf526a64fefd05f21a0a2688d4e261b5b290e896f2a41306e09f5a3474872fbf02f7781c2e031bc849d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432006933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 2672 wrote to memory of 660 2672 rundll32.exe 29 PID 660 wrote to memory of 2232 660 rundll32.exe 30 PID 660 wrote to memory of 2232 660 rundll32.exe 30 PID 660 wrote to memory of 2232 660 rundll32.exe 30 PID 660 wrote to memory of 2232 660 rundll32.exe 30 PID 2232 wrote to memory of 2696 2232 iexplore.exe 31 PID 2232 wrote to memory of 2696 2232 iexplore.exe 31 PID 2232 wrote to memory of 2696 2232 iexplore.exe 31 PID 2232 wrote to memory of 2696 2232 iexplore.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d56fb70c222d0ab0fca1312d311e52c9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d56fb70c222d0ab0fca1312d311e52c9_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.pchack.net/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d1a9b7bd1127016968cee4555a1ccb
SHA193a491f87b0682dbe59d261febb6211225e66c2c
SHA2566dbe5a871d6c927fd5f1bfc196e948e4cbce19dbd9982e414e96935c2c28f3fc
SHA512d0f7a5169385178c3bfd87c1e5ac76afd195b2e0e0d84e921ced6f35e12ec001039c9ef9c4a0023aeac3fd83924be71ffe3593bbe8c1ea27c9dced673f80ccfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b8c6e0dd45b0daba13e276c029362c
SHA17f963ac4a39b955f80914dd0911a90b8fa1fd8d4
SHA2567ba95a563d7c007a883ecd82654293a8a2f3e8eb014c22d3d18a59fc60064db8
SHA512a71812c8a1b0e0cf667780d8044c4df4c3bde17345a1e86298321c49123f1ab9d6a7d03cc3bbacbdf68c3ceaf37129e6b85ad6c81cfc2c0f0cd3588b636abcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1265e9b93bd1e46aafdc260d382a8b6
SHA1e4d4ca77d3929d263e1fb0c38c1e28421b9c1ad7
SHA256483470e4f33870d508065ac128a2d5e9084a871fe2aa25fe787eb788acc0e3cf
SHA5122ac1c91017df4f11155675540a02828a74709a3adf2d6de2f89681c61f8b7168c7a8179e011f16da0d30e7d65fb3cc97eba394c94d7bc604e4f66300f91fcd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df07f3aee1924cc8b7fb051c788f12e
SHA13a889c55f23c8ea6aa771818f7558a9e84e50b9d
SHA256172a391fb4b49f1fd4ae9cfb0546bf3ef7bf79736eb9e1454c0c2d8efb7700a5
SHA5123534562276ee0880718b33ae395a6d7889b29bc7b806dc68656afeb122b5c675d45cddb44ba6e8e481b4a99faff6bce59fc704808e37a43355bf2efee857b792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55920de3f35e5c4b40b79ef383234890c
SHA16fb9520a2598c816cccf806898acbe1d0b691408
SHA256eb69d1e3552c75ca9e9852660833ff69cb955bcd3a066d1498fa3c2cfacee4fd
SHA5129cf336facba4b157cd982b736f93f7fd49699e7e6884316558912a6fa3fc9057e1d770cf0dedbf70640f627f523fbe931aa86cda38a568d36047ddc6945ae4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1044bb7f84d918ff09571d6670dd7a0
SHA12caac88f08d0e5e32ee91703fb916778d204bfb1
SHA2564a36d863fd7e759fd2a8c25c153e8d6e4bad05ffe7bdb42f6c912d29259df82d
SHA5124d67bc1c9ad2dacadf60ed470bb5dbe18d857cf2e5dbf9a02f94fa8b5860983b0776d6251b22bc47deef53bef6336a0c98cb8a91a3f6e6b8cda1944b6580862a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dab7a61113bb4d0dd56229f64bd1c5f
SHA11ca297315100eac88f4efb814df41196931adebb
SHA256003901a9fcf8dc45d57fce70d1f85914ad7c5e914bf6176f1c0863f31765515b
SHA5123b8e93f681a68c69a795aa332597d139c49b60d2e6439db82fc9c9d3fa7eaf331feaa9ef216ebf332b4a59f72631151b5fece42b0d12251411cc5cd507755029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b0dbcc3943f48074fc03c2917b3b5c
SHA187330a7444998405d68017990b7084568cd71778
SHA256902db848e0cf86451fab2c2a9ec0f0affa8218c7fb4504cb39573ca3f5661226
SHA512c42d379904060feb57b20d1dad1cfae36d81dd76387fc1d3a1a73069601881ea09d032c9a2ce401d924f6a57a108617e804dca0cf7acbc7106b2ea0a603db005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb866864e7459bb660deb6a8e95cfb2
SHA1fe4a42081f0bbc0dd0adf26e303d24a3f3ed80b2
SHA2565ad08ef4eed4b3546bdb9da305de210dccdea6f7dd9012976e7cd39a56d4d24a
SHA512ee1fba3839003649ecb31425bac44e29b431a2dc43d9288e0716d4199577e7183314ad2cb4387b34d18400dba6b6acc9fe91c6e2a76d996d76de7f4dd0a9f726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646324a7ecd35b1f5a272e3dbb4901a4
SHA13b35a73474a49caee99a288825be3472290ca50a
SHA2568b7c1f43e8156c31343015b9271188b062bcf0e26f32536d74a1964db13d8fe3
SHA512a911ddd68005f569440866536aebb13d15049a1bde2adbb2bff1396cc7f8d2b45fc3e75bf1f72948c9e83d7c73628c7edce12e69036f76b7d29ea8b01c2d05ed
-
Filesize
155B
MD588d742d45f2d1dc872607d12241aa8a2
SHA1f48162ae97abdb0900ba41ebbd40f4205d0cf6d5
SHA2562c73b5225dd514b726a80b98537895a52ac838a9f3c7e40a1160002d323a44e7
SHA512119c2c945ad6a2fc50535507d54384e0769916d9ca385fe2d98bc56d3d275d559825ebb779de8c3c966bf409f53b0455b65a843556bc6c6aed340517eb194761
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTZJPBOG\favicon[1].gif
Filesize43B
MD5ad4b0f606e0f8465bc4c4c170b37e1a3
SHA150b30fd5f87c85fe5cba2635cb83316ca71250d7
SHA256cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
SHA512ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b