Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05ca1cd8a1075886bcfb638aeeb1017b_JaffaCakes118.dll
Resource
win7-20240611-en
3 signatures
150 seconds
General
-
Target
05ca1cd8a1075886bcfb638aeeb1017b_JaffaCakes118.dll
-
Size
14KB
-
MD5
05ca1cd8a1075886bcfb638aeeb1017b
-
SHA1
8751636435836f48607f857451f079379edf9a05
-
SHA256
45ad768f3c73bda6b52b362dca13e9ca1e24171bde1d9d6abfe8aae38b97096d
-
SHA512
9d1e977fc79254fa074ae996319fad3d3a49ee9efe925d86cee070cc0c8573afae1266466786d8394bb5cb6098e499781497b1577ab2e25a96806a6352d475b2
-
SSDEEP
192:P8CLBz27KvvemFFFXKePvJjNmJ6I4SFkBOkNusFZkSS1Ky+nwKHPXWsJe//RLwmy:Dz53RI4fFZKKypY9aRTtWUD2
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A6ACAE64-F798-4930-AD86-BD3FB32038DB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A6ACAE64-F798-4930-AD86-BD3FB32038DB}\ regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{A6ACAE64-F798-4930-AD86-BD3FB32038DB}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A6ACAE64-F798-4930-AD86-BD3FB32038DB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\05ca1cd8a1075886bcfb638aeeb1017b_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A6ACAE64-F798-4930-AD86-BD3FB32038DB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{A6ACAE64-F798-4930-AD86-BD3FB32038DB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A6ACAE64-F798-4930-AD86-BD3FB32038DB}\ regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28 PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28 PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28 PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28 PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28 PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28 PID 1708 wrote to memory of 1672 1708 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\05ca1cd8a1075886bcfb638aeeb1017b_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\05ca1cd8a1075886bcfb638aeeb1017b_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1672
-