Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 09:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ac6a2d90e0ed718722153ea8782a4a3_JaffaCakes118.dll
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
1ac6a2d90e0ed718722153ea8782a4a3_JaffaCakes118.dll
-
Size
786KB
-
MD5
1ac6a2d90e0ed718722153ea8782a4a3
-
SHA1
b5dd2b7c20330cbf13919e00ca35914e620e2285
-
SHA256
ed38f7a572415e5e1648f347a990fc3a3f2c4afcb3dd85e911277b27f866faca
-
SHA512
ee8c161578dce3ad261d7b67de7215debf9fb66d789a1dd495af7b4f941720b2e3eb8a0746467dd45b42e993326509dfafb2f5bf6180e1e161668b3bbc77d125
-
SSDEEP
24576:/SlFsJI3TOrQArNZOBXvhDkoR/WxG9uZZhUW2Slvt:/AyJI3T4QAx8LFMG9IwWdlvt
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB} regsvr32.exe -
Modifies registry class 5 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1ac6a2d90e0ed718722153ea8782a4a3_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\ regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1044 wrote to memory of 4436 1044 regsvr32.exe regsvr32.exe PID 1044 wrote to memory of 4436 1044 regsvr32.exe regsvr32.exe PID 1044 wrote to memory of 4436 1044 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1ac6a2d90e0ed718722153ea8782a4a3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1ac6a2d90e0ed718722153ea8782a4a3_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class