Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 01:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06dc75240481aaf1551354380c95f71e_JaffaCakes118.dll
Resource
win7-20240419-en
4 signatures
150 seconds
General
-
Target
06dc75240481aaf1551354380c95f71e_JaffaCakes118.dll
-
Size
160KB
-
MD5
06dc75240481aaf1551354380c95f71e
-
SHA1
ad8728d4c154c7ca463b8fa43da7160c679479fb
-
SHA256
91714527a91de8d7d527a441dc583f2498849950de71d430949140b53faba372
-
SHA512
05cc33af543c9e3cb217506b4eadbb8a456f953888343b2d21d58749b7562976c544bc9d3f18752c99a3888774b1adf6bcd825a956b451f01d8f245b7b9bdbfe
-
SSDEEP
3072:1SUgjrVyQqu577TIc3leO8evDwJoAOmojbKv5X:1SxfvTIc3leRFO/O
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0} regsvr32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system.ini regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\06dc75240481aaf1551354380c95f71e_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\ = "{296AB1B8-FB22-4D17-8834" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28 PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28 PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28 PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28 PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28 PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28 PID 1320 wrote to memory of 2956 1320 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\06dc75240481aaf1551354380c95f71e_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\06dc75240481aaf1551354380c95f71e_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Modifies registry class
PID:2956
-