Analysis
-
max time kernel
79s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 03:34
Behavioral task
behavioral1
Sample
0c51e206703115bdc163352608577b45_JaffaCakes118.dll
Resource
win7-20240611-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0c51e206703115bdc163352608577b45_JaffaCakes118.dll
-
Size
457KB
-
MD5
0c51e206703115bdc163352608577b45
-
SHA1
cbf78760a3711c9717e59e7407cf1259c1c7625f
-
SHA256
2c59179ff4390cbd7e9c99a080113274f247fea1a5a1cd9fa5e40dd087c0149a
-
SHA512
c1f51f501ff840e2da3e8fa1c3a9077b6133d5d16275a07cc9a8f20480a032df6d6a808b3ff3450f02e2a1223b1d9da2d6be7f578615cb8c208504e6833d08f3
-
SSDEEP
12288:5et3xsAC+ew80fmjqOxqAIHXzTziJu1MpLv28MtYcr:4t3+AC10fPyMv83cr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3180-0-0x0000000000400000-0x0000000000551000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF}\NoExplorer = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0c51e206703115bdc163352608577b45_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B9D5B4E-4679-43C1-818C-F1CFEDF83CEF} regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3180 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3180 4892 regsvr32.exe 81 PID 4892 wrote to memory of 3180 4892 regsvr32.exe 81 PID 4892 wrote to memory of 3180 4892 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0c51e206703115bdc163352608577b45_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0c51e206703115bdc163352608577b45_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3180
-