Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 16:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.dll
-
Size
563KB
-
MD5
28d87e37b0125a47d8b9e43d5e274318
-
SHA1
51a1489283fc396c88306ce5205313ae2c767985
-
SHA256
96e04d417c2279687a87d8d44767fb12d207644205599c37074435c4e1609064
-
SHA512
d25ce516ee18741d6a1f3f3b811af57a974e359f8820dce07d2093e1139af0c5d02ebd9400d0eeee177ce3cd9124627c98183fa6f652fe368c4dc4c43f18ab15
-
SSDEEP
12288:M0Et9YDc/Tk4Po4wSSqodPF9C2vTgYkcRJhh4d:UtWDcw4o4Ts/9CkkGv4
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.sh\Clsid\ = "{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}\ = "sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.sh\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.sh regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.sh\ = "sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}\ProgID\ = "28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-E881-FA41-CB19-87F6879D4FBA}\InprocServer32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4948 2648 regsvr32.exe 82 PID 2648 wrote to memory of 4948 2648 regsvr32.exe 82 PID 2648 wrote to memory of 4948 2648 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\28d87e37b0125a47d8b9e43d5e274318_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4948
-