Overview
overview
10Static
static
362785703db...18.exe
windows7-x64
1062785703db...18.exe
windows10-2004-x64
10$TEMP/35.opends60.dll
windows7-x64
1$TEMP/35.opends60.dll
windows10-2004-x64
1$TEMP/Ombudsman.dll
windows7-x64
1$TEMP/Ombudsman.dll
windows10-2004-x64
1$TEMP/PermCalc.exe
windows7-x64
1$TEMP/PermCalc.exe
windows10-2004-x64
1$TEMP/TreeCell.js
windows7-x64
3$TEMP/TreeCell.js
windows10-2004-x64
3$TEMP/User...er.exe
windows7-x64
1$TEMP/User...er.exe
windows10-2004-x64
1$TEMP/ancon.exe
windows7-x64
10$TEMP/ancon.exe
windows10-2004-x64
10$TEMP/conmanui.dll
windows7-x64
1$TEMP/conmanui.dll
windows10-2004-x64
1$TEMP/makecert.exe
windows7-x64
1$TEMP/makecert.exe
windows10-2004-x64
1$TEMP/ubi-...36.pyc
windows7-x64
3$TEMP/ubi-...36.pyc
windows10-2004-x64
3$TEMP/vcbuild.dll
windows7-x64
1$TEMP/vcbuild.dll
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
62785703dbd48226259b994a57c0842c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62785703dbd48226259b994a57c0842c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$TEMP/35.opends60.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$TEMP/35.opends60.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$TEMP/Ombudsman.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$TEMP/Ombudsman.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$TEMP/PermCalc.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$TEMP/PermCalc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$TEMP/TreeCell.js
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$TEMP/TreeCell.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$TEMP/UserControlTestContainer.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$TEMP/UserControlTestContainer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$TEMP/ancon.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$TEMP/ancon.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$TEMP/conmanui.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
$TEMP/conmanui.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/makecert.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$TEMP/makecert.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
$TEMP/ubi-console-setup.cpython-36.pyc
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/ubi-console-setup.cpython-36.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$TEMP/vcbuild.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
$TEMP/vcbuild.dll
Resource
win10v2004-20240508-en
General
-
Target
$TEMP/vcbuild.dll
-
Size
11KB
-
MD5
1b84d7e16763d4686874c20e07437bec
-
SHA1
9d3088e977c5b6a322bdeb538487a73887fbcc0e
-
SHA256
a020d37724b738aab3c295917b6a23f8de45449177615a88e7c93627de424280
-
SHA512
4f9715ed1d8473c884965688dc9e4c06d53143240909c096ef340ed3e4ddf157331b0417fcb334a5c8b2b7c25b609f21262d8f3863567e3cbb4e05a3396f4821
-
SSDEEP
192:IIeYBmMNCZ2LjRj23/pv6u5TN3XSGMKS6vrkrbAVuWDxpBSWNLft5AgI/:LNBma2GjR23/IuToKS68nWD0WlftpW
Malware Config
Signatures
-
Modifies registry class 25 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\ = "IVCBuildErrorContext" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\ = "PSFactoryBuffer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\NumMethods\ = "27" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB513}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB512} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\ProxyStubClsid32\ = "{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB513}\NumMethods\ = "6" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$TEMP\\vcbuild.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB513}\ProxyStubClsid32\ = "{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{52F14F3A-90EA-4307-8E01-CDECFE97D4D1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB512}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB513}\ = "IENCBuildSpawner" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB513}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB512}\ProxyStubClsid32\ = "{52F14F3A-90EA-4307-8E01-CDECFE97D4D1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB512}\NumMethods\ = "4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB513} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB512}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79050497-F1F0-4BFA-A337-1DB93CEEB512}\ = "IENCBuildSpawnerCallback" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4856 wrote to memory of 1696 4856 regsvr32.exe regsvr32.exe PID 4856 wrote to memory of 1696 4856 regsvr32.exe regsvr32.exe PID 4856 wrote to memory of 1696 4856 regsvr32.exe regsvr32.exe