Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe
-
Size
52KB
-
MD5
e91b6d9bd604024d1b63149957f873ee
-
SHA1
b09928af94aedee4edf32f6afc427c7e7ff88841
-
SHA256
cc20af452f633b393c01229ef072cd51d91cf81c46b94e3b932155ca6e7e0d05
-
SHA512
184c593a0426b73e45d963e1ea8670e6ae32cc99c60e15c9404530864edd5bf7589a30ba84037f20b4fd7b3308a4448a13bb3b389a90c5e267ffea8138a3faaa
-
SSDEEP
768:c5wt59uxWdYpQ38YIFwOXQg5J2HMD/ihzRDtT9UxrcTWArP:FtqDX5gH4OJT4ATzP
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72A128E0-2240-40c8-9E92-5387D64F839E} regsvr32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xml2u32d.dll e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe -
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ = "IDocEventHandler" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\0\win32\ = "C:\\Windows\\xml2u32d.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP.1\CLSID\ = "{72A128E0-2240-40c8-9E92-5387D64F839E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\ = "XMLLIB 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\ProgID\ = "XMLLIB.XMLDP.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\ = "{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP\CurVer\ = "XMLLIB.XMLDP.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\ = "{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP\CLSID\ = "{72A128E0-2240-40c8-9E92-5387D64F839E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\TypeLib\ = "{6D0111E3-3060-4d23-B2BC-42ED86CBE9A3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP\ = "XMLDP Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\ = "XMLDP Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\VersionIndependentProgID\ = "XMLLIB.XMLDP" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\HELPDIR\ = "C:\\Windows\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\ = "{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ = "IDocEventHandler" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\ = "{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D0111E3-3060-4D23-B2BC-42ED86CBE9A3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XMLLIB.XMLDP.1\ = "XMLDP Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\InprocServer32\ = "C:\\Windows\\xml2u32d.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72A128E0-2240-40c8-9E92-5387D64F839E}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28 PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28 PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28 PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28 PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28 PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28 PID 1392 wrote to memory of 1848 1392 e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e91b6d9bd604024d1b63149957f873ee_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\xml2u32d.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD563f1f26e4e775334724faea19260bf55
SHA16159d4e1563013b1df88aa81efa335500ba51d4f
SHA25686fdd0b8be3fe9af42ee77c6cc3652a7b646930fa34b35d0f6362ccdf85ec7d8
SHA51293b123f9bca741d965b5f4a8a7ea64dc14d3e8f76666d7f6c9afc30e29fbc2667c9a19dda67b670bacc5d0e58c4e3e33ae9081c9b72a5c90f97be0969d8961b2