Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 04:01
Behavioral task
behavioral1
Sample
248f436f6d98bff390055ea13f935f14_JaffaCakes118.dll
Resource
win7-20240419-en
3 signatures
150 seconds
General
-
Target
248f436f6d98bff390055ea13f935f14_JaffaCakes118.dll
-
Size
71KB
-
MD5
248f436f6d98bff390055ea13f935f14
-
SHA1
d6f42a7d5182abd3bea0c2c342af2e92d5cbb1f9
-
SHA256
e5db28613bfab743266ed9a85289bc618b88345faadaad0e76bb35408c02aaf5
-
SHA512
e30a4fa6b2f4079dcc80d41e275ff50a87b5eae2d179cf659a99e6b1c1b95922f90f2b8251278de657592d8194ec0d33dcec273305ca85635aac28a0cc71caf6
-
SSDEEP
1536:MhA8pJv17kHxaqqQSmoGpdQBZ2U9bQE3NnL/Fp3MB:MhA87vBqq5BGpdz8bQE3NhlMB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2928-0-0x0000000010000000-0x0000000010036000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830} regsvr32.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\VersionIndependentProgID\ = "urlmon.urlmon" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\ = "{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon\ = "urlmon Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\248F43~1.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\248f436f6d98bff390055ea13f935f14_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1\ = "urlmon Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1\CLSID\ = "{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon\CurVer\ = "urlmon.urlmon.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\ = "urlmon 1.0 Library Type" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\ProgID\ = "urlmon.urlmon.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\ = "{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\ = "urlmon Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2928 4972 regsvr32.exe 88 PID 4972 wrote to memory of 2928 4972 regsvr32.exe 88 PID 4972 wrote to memory of 2928 4972 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\248f436f6d98bff390055ea13f935f14_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\248f436f6d98bff390055ea13f935f14_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1280,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:3540