Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 07:05
Behavioral task
behavioral1
Sample
151681c9e3f00b5ba4fe36ca8fcf3bfa_JaffaCakes118.dll
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
151681c9e3f00b5ba4fe36ca8fcf3bfa_JaffaCakes118.dll
-
Size
86KB
-
MD5
151681c9e3f00b5ba4fe36ca8fcf3bfa
-
SHA1
bef6f60a8e3e30384b449f3487be36cbc98f6242
-
SHA256
d9396d23757b2c6b130f3d01f442beaa1c799df1293f60cb8357b47d922112a8
-
SHA512
ba60cd6948c361d6c8412373e3be6d5c2840a56e7b32073fc19eb12b3a3c8e81a4d522dffd4218b487d13231031d698f4ccd3e0eceeb237be861aea9432adf78
-
SSDEEP
1536:sYvynn+A2V0JaHkRhD7FU9Ba1wgyymjC4ZsACA5N9/XpgQojDEUMn3b:5v4+ALJYO7FSg1wgyNsAHvghjgUML
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5EF749D0-8BEB-426C-834D-E8275030BC83} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EF749D0-8BEB-426C-834D-E8275030BC83}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EF749D0-8BEB-426C-834D-E8275030BC83} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EF749D0-8BEB-426C-834D-E8275030BC83}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\151681c9e3f00b5ba4fe36ca8fcf3bfa_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5EF749D0-8BEB-426C-834D-E8275030BC83}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1036 wrote to memory of 3636 1036 regsvr32.exe 92 PID 1036 wrote to memory of 3636 1036 regsvr32.exe 92 PID 1036 wrote to memory of 3636 1036 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\151681c9e3f00b5ba4fe36ca8fcf3bfa_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\151681c9e3f00b5ba4fe36ca8fcf3bfa_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:81⤵PID:2288