Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 05:43
Behavioral task
behavioral1
Sample
2b2e2d617883eec929dfe3604bf9e0bb_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
2b2e2d617883eec929dfe3604bf9e0bb_JaffaCakes118.dll
-
Size
354KB
-
MD5
2b2e2d617883eec929dfe3604bf9e0bb
-
SHA1
cd31660701c38e625e3e02ddc6b82d92c9dc1c65
-
SHA256
86f2479dd05b73a37a51781888ebbbdd39b74ee5f925c6039a64d74de55910c8
-
SHA512
18ce5f3f1539d6481568c75b1ae78cea03a1303de98ee9f2a290a88cfa3e0655e480ed9649342b6d451b06d35c7d14bffcb35598e24849be07ff18d745590807
-
SSDEEP
6144:30h1OLot3tKNbSdxVSr810HXBlT3XvpNU9D+0uBlB8MACrvIFPJNou:3zomMJn03BlTsonrPrTIFPJN
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2188-0-0x0000000002000000-0x0000000002122000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\Noexplorer = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2b2e2d617883eec929dfe3604bf9e0bb_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30 PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30 PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30 PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30 PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30 PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30 PID 2080 wrote to memory of 2188 2080 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2b2e2d617883eec929dfe3604bf9e0bb_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2b2e2d617883eec929dfe3604bf9e0bb_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2188
-