Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 05:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fe7f30003881152314460ff242dbf053_JaffaCakes118.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
fe7f30003881152314460ff242dbf053_JaffaCakes118.dll
-
Size
14KB
-
MD5
fe7f30003881152314460ff242dbf053
-
SHA1
67b87d1b84c22950bcfce01f6b2d9f1d4dc08db7
-
SHA256
d21425e11e39831ba4d7fa2aef19089fe65381f1bcf3cf00d8dc73293d73bc5f
-
SHA512
0936b59c7048b0ac5f6318edc94c0e90d827efd16f66b39963406c6817be9aac22b5bf31843cf57733c83fe36533b34b45fb2b093c011c96323d68d0613b7de0
-
SSDEEP
192:Z9XjLnu/yADy9YLBl/BXvLVI3JNLSYV6H7OXy/d4V3gdIdq4OSyGLjGA:Z9z6yAHHJXDVI3J5dVE7O0d4VHOS
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C5AF42A3-94F3-42BD-F434-3604832C897D} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5AF42A3-94F3-42BD-F434-3604832C897D}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5AF42A3-94F3-42BD-F434-3604832C897D}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fe7f30003881152314460ff242dbf053_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5AF42A3-94F3-42BD-F434-3604832C897D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5AF42A3-94F3-42BD-F434-3604832C897D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5AF42A3-94F3-42BD-F434-3604832C897D}\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fe7f30003881152314460ff242dbf053_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5AF42A3-94F3-42BD-F434-3604832C897D}\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4412 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4412 4636 regsvr32.exe 87 PID 4636 wrote to memory of 4412 4636 regsvr32.exe 87 PID 4636 wrote to memory of 4412 4636 regsvr32.exe 87
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fe7f30003881152314460ff242dbf053_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fe7f30003881152314460ff242dbf053_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4412
-