Analysis

  • max time kernel
    92s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-06-2024 11:09

General

  • Target

    bb9d3ef069c75230d05690832ec36896_JaffaCakes118.dll

  • Size

    875KB

  • MD5

    bb9d3ef069c75230d05690832ec36896

  • SHA1

    a30948d8eaf546919e752de5790e08c60588dc9c

  • SHA256

    15299caa1b5415ff77b186682574625dd896aec4daa0c543c737e38bfb05845f

  • SHA512

    0e6ac6b8d59245e740e09fe6028061ffcf6c14f8df82ce6d575fb6e1d4b4043a9c6182a07a4de68e358bc0f77a7f05a55f10dbd9d08c74b99e9b4b92fdbba1a5

  • SSDEEP

    12288:JtQtKwHeZOFwqhs8Zvr4bBJ8ser/57mT/VCjV3O:DQtKDUwf8ZvrmJjeTkTYs

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bb9d3ef069c75230d05690832ec36896_JaffaCakes118.dll
    1⤵
    • Installs/modifies Browser Helper Object
    • Modifies registry class
    PID:4076

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Browser Extensions

1
T1176

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads