Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 16:28
Behavioral task
behavioral1
Sample
28d3db15d78e764146e1341034d18d1f_JaffaCakes118.dll
Resource
win7-20240220-en
3 signatures
150 seconds
General
-
Target
28d3db15d78e764146e1341034d18d1f_JaffaCakes118.dll
-
Size
71KB
-
MD5
28d3db15d78e764146e1341034d18d1f
-
SHA1
999d14d2eb4f3ee0281682cb43b0a3d7f7cee99a
-
SHA256
206d72685fdb62d7cdc4c1cbd1ab1ab9c35466f956ee3d126e35dce28733df4c
-
SHA512
fca5c07229b5905873acd113f7e5251f7fd96e6aed23ee94c45de81182b989625d45e499d5eccfdcb1efb2dc67f924c8a185c735d24976982b251f2cc25b97d9
-
SSDEEP
1536:0BqDFaLpzRYJyoU7aJjMzIe1H71JRi4badCXcqnCNt509P0ATFV1d/TwTSo+J:yQa0U7MMMYp+4eCznJMAJV//TwTSZ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1652-0-0x0000000010000000-0x0000000010035000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830} regsvr32.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28d3db15d78e764146e1341034d18d1f_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\ = "{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1\CLSID\ = "{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon\ = "urlmon Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\ProgID\ = "urlmon.urlmon.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28D3DB~1.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\ = "urlmon 1.0 Library Type" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon.1\ = "urlmon Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\ = "{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\urlmon.urlmon\CurVer\ = "urlmon.urlmon.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\ = "urlmon Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFFFEECE-FF18-8222-2FB0-2935B9EA0830}\VersionIndependentProgID\ = "urlmon.urlmon" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFFFEECE-FF18-8222-2FB0-2935B9EA0831} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FFFFEECE-FF18-8222-2FB0-2935B9EA0832}\ProxyStubClsid32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1652 4776 regsvr32.exe 82 PID 4776 wrote to memory of 1652 4776 regsvr32.exe 82 PID 4776 wrote to memory of 1652 4776 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\28d3db15d78e764146e1341034d18d1f_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\28d3db15d78e764146e1341034d18d1f_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1652
-