Analysis
-
max time kernel
91s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 19:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f1c30861c22304aa19addae86ba738a4_JaffaCakes118.dll
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
f1c30861c22304aa19addae86ba738a4_JaffaCakes118.dll
-
Size
524KB
-
MD5
f1c30861c22304aa19addae86ba738a4
-
SHA1
ffecc4627b33a584cc26719d27a2b69c289ac4c7
-
SHA256
6591a2912fd17b47a0141e8d54b417f05eb4af00b80e7c13f0a1bf0fc5e572f1
-
SHA512
4f736b3065a3df9b8a11ca8d5b9afbec6b8014e952427c74ad3b4d4ff1172e89d5d44080aa68eb1c2f463a5227ecd18b5610cfe295693b32efd4fa4744d8dcd6
-
SSDEEP
12288:XY86FTQ+RvPWa7Z68unGxsk9L1shQyEBIZWMBClOUInWTJW+:XYPFr7Zbun+siLm1zWMpOTJW+
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5742F79A-1D91-42c4-990C-B46CF55A6478} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5742F79A-1D91-42c4-990C-B46CF55A6478}\ = "sr" regsvr32.exe -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr\CLSID\ = "{5742F79A-1D91-42c4-990C-B46CF55A6478}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\ProgID\ = "sr.sr.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr\ = "CPubSR Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\sr.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\ = "sr 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\ = "CPubSR Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr\CurVer\ = "sr.sr.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f1c30861c22304aa19addae86ba738a4_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\TypeLib\ = "{CF87E7D9-D16A-485C-9104-943A0C088EF3}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\ = "IPubSR" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\TypeLib\ = "{CF87E7D9-D16A-485C-9104-943A0C088EF3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr.1\CLSID\ = "{5742F79A-1D91-42c4-990C-B46CF55A6478}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\VersionIndependentProgID\ = "sr.sr" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr.1\ = "CPubSR Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\ = "IPubSR" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f1c30861c22304aa19addae86ba738a4_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\TypeLib\ = "{CF87E7D9-D16A-485C-9104-943A0C088EF3}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000_Classes\AppID\ = "sr" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\sr.DLL\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sr.sr\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5742F79A-1D91-42c4-990C-B46CF55A6478}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CF87E7D9-D16A-485C-9104-943A0C088EF3}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3B79DD5-4CD5-4F97-8829-5E1F08D46C66}\TypeLib\Version = "1.0" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 1916 2732 regsvr32.exe 86 PID 2732 wrote to memory of 1916 2732 regsvr32.exe 86 PID 2732 wrote to memory of 1916 2732 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f1c30861c22304aa19addae86ba738a4_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f1c30861c22304aa19addae86ba738a4_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1916
-