Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 03:12
Behavioral task
behavioral1
Sample
0252a5f802e212f1792032a8e4d6052e_JaffaCakes118.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
0252a5f802e212f1792032a8e4d6052e_JaffaCakes118.dll
-
Size
86KB
-
MD5
0252a5f802e212f1792032a8e4d6052e
-
SHA1
529e56a200458aba760ae523c8cd2bcfaeb9a73c
-
SHA256
d9b26d38146b11a1cea6051267fdd03f254a09e97d4b7b1823a82cb644de19ed
-
SHA512
f6588a4cb3d0fa935ae0625b3ccdbeb3f996453248ef3fbcf9748a45d9af2663641bd7b65d403e1a7d9773ef851280862b5fe2093b8f7c25a7733cbf2e1f8b25
-
SSDEEP
1536:KYvynn+A2VreCGivZb56MVeVHRK+R6HS+CR6ZnalHGVWR1CcUntsydPj:Hv4+Ahl5oy6bCR6xa4I7entsyZ
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3E3F24D0-A2BF-4AA8-9351-B1BBF84FC2B4} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E3F24D0-A2BF-4AA8-9351-B1BBF84FC2B4}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0252a5f802e212f1792032a8e4d6052e_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E3F24D0-A2BF-4AA8-9351-B1BBF84FC2B4}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E3F24D0-A2BF-4AA8-9351-B1BBF84FC2B4}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E3F24D0-A2BF-4AA8-9351-B1BBF84FC2B4} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 1312 4856 regsvr32.exe 83 PID 4856 wrote to memory of 1312 4856 regsvr32.exe 83 PID 4856 wrote to memory of 1312 4856 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0252a5f802e212f1792032a8e4d6052e_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0252a5f802e212f1792032a8e4d6052e_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1312
-