Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
03e3c0a239be50c50e369d4d71ecf1bf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$R0.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$R0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$R2/NSIS.Library.RegTool.v3.$_0_.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$R2/NSIS.Library.RegTool.v3.$_0_.exe
Resource
win10v2004-20240611-en
General
-
Target
$R0.dll
-
Size
120KB
-
MD5
1e337e4316c2c973180e635218897f78
-
SHA1
e73cbb449c451a8dbdbabc9e42d84659e5b9158e
-
SHA256
269d150bcb4e6b94c5c07174ae73ed642c922fb73f43974f4fc1158e7815e4e0
-
SHA512
c2109c0a0b3f57371d8f5e3dbf0c32854247bf8709291e4f53549d7fa515dc56a6cc5df75e52213d2e5af45daaf4179075a26c93d4e1f536a1596bce7e8a3fdb
-
SSDEEP
3072:vJ+wnavKxgyTeO+dNLeMyQAyEekJVGCJWZsS:vJ/nYKxEvTP6ekDYZR
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral5/memory/2216-7-0x00000000001E0000-0x0000000000220000-memory.dmp upx behavioral5/memory/2216-6-0x00000000001E0000-0x0000000000220000-memory.dmp upx behavioral5/memory/2216-5-0x00000000001E0000-0x0000000000220000-memory.dmp upx behavioral5/memory/2216-2-0x00000000001E0000-0x0000000000220000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5B02530C-8A5D-405F-8B84-AA41B6B8A302} regsvr32.exe -
Processes:
regsvr32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main regsvr32.exe -
Modifies registry class 6 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$R0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5B02530C-8A5D-405F-8B84-AA41B6B8A302}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 2216 1912 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\$R0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\$R0.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2216