Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 07:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.dll
Resource
win7-20240611-en
3 signatures
150 seconds
General
-
Target
042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.dll
-
Size
443KB
-
MD5
042f85ef1b4aba0dec57b4c72e872166
-
SHA1
c4e6e3417998dfc33d9ce974d2b937621edaffa7
-
SHA256
584dd4f18ff5bd80417cb2e263e244bf32804011c4a68a0db7d4fb093ee8fd60
-
SHA512
434366aab8950c045fd92bfc526cb8d9ab0d32cc7dde3baa24017bc416edb0ffdbd82a8da8da3ce2d2a22deff57386709f7e7f704c01e217c5247f86946afb33
-
SSDEEP
12288:ib7sTxp/SQ9OBtYvNKgwX+M5bEVpfWYm7:i3+iQ9OTa0gy+aSpf1
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{884B6FB1-B27D-4719-B64F-0EF41D469FDE} regsvr32.exe -
Modifies registry class 11 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.z9981z\Clsid\ = "{884B6FB1-B27D-4719-B64F-0EF41D469FDE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE}\ = "z9981z" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.z9981z\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE}\ProgID\ = "042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.z9981z" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{884B6FB1-B27D-4719-B64F-0EF41D469FDE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.z9981z regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.z9981z\ = "z9981z" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4128 wrote to memory of 4392 4128 regsvr32.exe regsvr32.exe PID 4128 wrote to memory of 4392 4128 regsvr32.exe regsvr32.exe PID 4128 wrote to memory of 4392 4128 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\042f85ef1b4aba0dec57b4c72e872166_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4392