Overview
overview
7Static
static
33ad5bde8a3...18.exe
windows7-x64
73ad5bde8a3...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/$S...1_.exe
windows7-x64
7$SYSDIR/$S...1_.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/$_5_.dll
windows7-x64
6$SYSDIR/$_5_.dll
windows10-2004-x64
6Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
3ad5bde8a365e628b5fd00704e9ade2b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3ad5bde8a365e628b5fd00704e9ade2b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$SYSDIR/$SYSDIR/$_1_.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$SYSDIR/$SYSDIR/$_1_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$SYSDIR/$_5_.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$SYSDIR/$_5_.dll
Resource
win10v2004-20241007-en
General
-
Target
$SYSDIR/$_5_.dll
-
Size
396KB
-
MD5
053541070466b4dc0f8b2b79545681d4
-
SHA1
e68982ab132b553fe1ffa99d367d7b2ffdb793a5
-
SHA256
5d292249e6cf6e2bffe6e3288fb687b6af57599e5e1b58ad689fd24dc4ab8826
-
SHA512
43e39e7d50b1fd71d3c586903420f35f3973d8c5e79f178865365c67f2a3b28a337535f571f152dddeb355c493ae627507016175c1198be004dafe7bf89f4d4a
-
SSDEEP
6144:Z2sizbp4h+bANskjE+h1M/4gmNpGmC5+BoOzVOUJvOBd3ZX+FlNzH:jizzbANsN+DtJ7GmVlhOUJGBd3ZuFb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wkrlftnsdofhfl = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\$SYSDIR\\$_5_.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2}\NoExplorer = "1" regsvr32.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11734A61-88B1-11EF-ACA8-72B5DC1A84E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434909828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$SYSDIR\\$_5_.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2}\ = "cashtitan browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FC52E933-3B38-D0C1-068B-EEC8DB26BAC2}\InProcServer32 regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2716 wrote to memory of 2820 2716 regsvr32.exe 30 PID 2892 wrote to memory of 2728 2892 iexplore.exe 32 PID 2892 wrote to memory of 2728 2892 iexplore.exe 32 PID 2892 wrote to memory of 2728 2892 iexplore.exe 32 PID 2892 wrote to memory of 2728 2892 iexplore.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\$_5_.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\$SYSDIR\$_5_.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2820
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a9b2a51a45cfae137938b5a64d0772
SHA1bb827b2d08eb8b2656512e9755714d707a820f02
SHA2561da4cc9ce5e53ca516033fdd4afb875e0bd9f94d4094481f50dfe49ef7fdb829
SHA51282e546ded40d83f46cf721fd3cb7fc39c7ee47b16e13354cb0b1ea6bae6644703683006a922ab59649a1943f2dd89afd09fa3eec697c6deca443b50f5fbd2b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560568cb50af4db45b5388468d1006469
SHA1a757c0364764838b18e642cab2ce425a4c45c4bd
SHA256b3b2de1396d8838c2c0d0bc18037af64db4d3ea0d77c1b24add706905e124b1e
SHA5121335163c444f7cd166116b6c19b15d54dc73370e69efc8cf0bf0318e339b93d180e30dc6fc7b4111729304669c7a8daedf8cbd46068e4a03974765a9e7f6b9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831fea348df46824a74a8da70aeaf07b
SHA1ef8e90b279863f64b2e6ab8c59a481b0c54781e9
SHA2565a0772a1dbc1d787f928d2bf2eb834805f2c08c659e8e04da5aca3313a31e1e2
SHA5125ce80058d2eaa9bcee2861e6a48093b3ba8e59cc997a1b1d90565d1f223965522a701346db4752c9f58a0ea909e1f43a7b29e5fa8fcbaa4ad8c337cce32e00ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47694b19fc0ce7f34c287fddeca65d8
SHA1f82bd6ec9b8cefc63c111b0bbff0052824c3da8f
SHA25664dfc85c2ef5d9e828df09a116cc6bff6c36340fcfb19d699f1cce0c7bc12276
SHA512fabd65efce2bca243df6d846c5a7474afd76fff177ec128a26d8ee87d485f639f86b2c43179f9f5350adc92b6e9ec4f58be5ab5be1f9218289e2417678e81374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d668eb003f2d408e23385d026f267e
SHA1b23fec1a96170446b4f489eff89855ac5ffef4d5
SHA256583a90e713e2894a6c0ba3f1a3400259d277da831ae7ee0cfe5c8fa61fd07314
SHA512b771e3b1b736e1297e0eda513e0a27f52b731998580c8179d8f9d1571f45df7ccda527c72e59671538941750e9d5af7c5ebfb93f878467a3a168d260fb78dea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ceabd906717c5ff864ec81a5cb9b15
SHA16bb9ee1c2d425b9751b1a8706ce625c6df544c6c
SHA2567554d5ecb304449b56473ea2aef9cabcc49890407ab1e408c48bafe4a3f8becc
SHA512be07dc6355c9ebc72e0b3bf088d7437cc96a58cfdb0ad017221d4d88a9d43acab56363491c260c9c194c9243dfe6cd61e4e9e870f3b44c89b7af3d4bdece17e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334a2d8b4c155f42b4250fb5aa1c7c01
SHA1ff9f0aa6bff6a0c9c12980289922dc414e1ef4df
SHA256deed209491532ab1965d29aca350e4df32602137cec49ad80aa61d85278e2aa1
SHA512ede023b37964544def6b89dfc286a1323b9b1209eb98e756e126bf2e80aa356ab85329fd273aa4686a4554e6a2d875dd619ba8674b96bf40b2604c9c80cd602b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9af2338814c7125cabb325e4519691e
SHA10ecc511575006349b5e4e62666935d9c557b14e7
SHA256bac6a371aa8b8a83196afdc0eeacf584fb33350afb959617d5b7bb93e15b7e6e
SHA51284690ddf8971ba9082e4e4e5fbecc2c36dd41faf55d3f2d5ef1260b81c1c5c97dc0cf383e6e307b9d4fb859409e910ce676ef89962127c65fff1f17f117e0bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72da724edd8235ededca71102e76941
SHA1545b508f8fc0205d97467cf29647c732c0861c89
SHA256cd8848166ddbb0b42b77686406ce0b1eca6940cf7c03fc18b6a1a9cda4093d8b
SHA5122117ae5488fb77ca71c4536f568cbc0d53d47c13b5999b10ed717c094ac5808cfb9b7ebf0914aaff198c33768aabc1ce1f86b69c92cb993b37492f7bdf262de6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b