Analysis
-
max time kernel
77s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll
-
Size
378KB
-
MD5
176bed80cd1808ab3cc906d344beb8c1
-
SHA1
13b630b0ff9c07af279e894810903c357f44060d
-
SHA256
4fb708c8babd5f2cc8057efef225c63ff5b5e8eac84f16901e5c92129289aab4
-
SHA512
bd83602f795f0a46e2cc991d78ca306dc50bc9fe56dd3cba8031655d2ed137f6b8af91d88af43adb4b731fd8e2ddd4fddb19b016f5bed88686f6330c6ca817ee
-
SSDEEP
6144:StE0VT6P9cSrJak1c659bBxBsbAh27CNvvjEvdnslHnPeK3iFlD4tCkhbv2s79ZO:StE04TrEk1c499x2b/+vvYvdnkHnPeK0
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ciolmakmwf = "C:\\Windows\\System32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8808436D-BA6D-063F-FF3A-26D9C7DA641D}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8808436D-BA6D-063F-FF3A-26D9C7DA641D} regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425682175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{409E4ECF-34C4-11EF-BCA5-6E6D447F5FDC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a415000000000200000000001066000000010000200000000a576c310893573783264e8882770b2f8c13f28189968668a6503aa8de30568e000000000e800000000200002000000016381c85866840c2ac5d12e29800b93361c2f78039ad8e4b79c4d018ab28cb8b2000000041f3bcadcb6e04d15a106384ddb745f3a31c343061f99113afcadb097f6e278f40000000da029b14a53df52eda89d782491a5f1d948e7308a6b066edb954e50860cc729cda2d94f16633c961b2f34d6bcef72cc002afc0a2cf8ee126f548e146869912a9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a41500000000020000000000106600000001000020000000b9e0b3d13fcc2854cc0615e88f9ee090ed9e48abc0de8872d7344e5bbea51705000000000e8000000002000020000000c043187dfa41787113bf3a7603fbdb903e5d5bec64448e760ecae5cbc94497d320000000cf5d7c585f678f155be43a53c8a053eae510903deaa21ee9be0514547b3a8afa40000000a07f2a8a550c49c23bd3d27d5d59ff231b1ea0efcf9f7e28ca8fb774fbaeda4a530177ef5eb71eb63a7e6318875c24731da500abbd38f4caa6a565ff534e6bf3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00df823d1c8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e1f023d1c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8808436D-BA6D-063F-FF3A-26D9C7DA641D}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8808436D-BA6D-063F-FF3A-26D9C7DA641D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8808436D-BA6D-063F-FF3A-26D9C7DA641D}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8808436D-BA6D-063F-FF3A-26D9C7DA641D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8808436D-BA6D-063F-FF3A-26D9C7DA641D}\ = "rightonadz browser enhancer" regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 652 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 652 iexplore.exe 652 iexplore.exe 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2372 2684 regsvr32.exe 81 PID 2684 wrote to memory of 2372 2684 regsvr32.exe 81 PID 2684 wrote to memory of 2372 2684 regsvr32.exe 81 PID 652 wrote to memory of 1308 652 iexplore.exe 84 PID 652 wrote to memory of 1308 652 iexplore.exe 84 PID 652 wrote to memory of 1308 652 iexplore.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\176bed80cd1808ab3cc906d344beb8c1_JaffaCakes118.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2372
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:320
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:652 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1308
-