Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 08:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1973e180788882dcf50b08bab183ee24_JaffaCakes118.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1973e180788882dcf50b08bab183ee24_JaffaCakes118.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1973e180788882dcf50b08bab183ee24_JaffaCakes118.dll
-
Size
35KB
-
MD5
1973e180788882dcf50b08bab183ee24
-
SHA1
2e924312af9c3d66dc70087ea710659b34efa1c9
-
SHA256
199f92ab7a4720ab66786eb9681cffc4dc831e72fee9cba83a7a8d888d1670a1
-
SHA512
3e81f0a0fe04281a955cef0f7b1ae1ea6359491ab4b1f8e9ec5254d259ffabbeccdcb925ea034dbacf4cc80e9e051a8c00beda5a427cb0c82d8d3256480b183b
-
SSDEEP
384:y+1knCymBN85JjMsvHniDJlLQ3TDFhHV26IdibJO/bLuOUmqpzalSutP2dYOFr44:HSCyKN84svHiDfQ3/fV2hwJOisKdnILw
Score
1/10
Malware Config
Signatures
-
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{df2e4f67-e93a-11d1-bb14-0000f8779051} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{df2e4f67-e93a-11d1-bb14-0000f8779051}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1973e180788882dcf50b08bab183ee24_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{df2e4f67-e93a-11d1-bb14-0000f8779051}\ = "Passthru Driver Configuration Notify Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{df2e4f67-e93a-11d1-bb14-0000f8779051}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\ = "Passthru Notify 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{df2e4f67-e93a-11d1-bb14-0000f8779051}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1973E1~1.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28 PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28 PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28 PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28 PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28 PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28 PID 2936 wrote to memory of 1744 2936 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1973e180788882dcf50b08bab183ee24_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1973e180788882dcf50b08bab183ee24_JaffaCakes118.dll2⤵
- Modifies registry class
PID:1744
-