Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 09:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.dll
-
Size
634KB
-
MD5
2bd84b9ef17d7491b67fb79dec65925c
-
SHA1
124f8d80a3ce064ec347809c3f2842104f0f573c
-
SHA256
978a32ce8ace0cde32e6969bdcdd7b0d18f9d5a0b91009d6d22bcb61fdc96518
-
SHA512
e93897d50c8f780aebd87660987cedba7900e58efc234fad29c9d480e7ccedbb2bdd48e5670783bb8568d4124180c3c3a4cdbb231e8ecebabd5257656f371a85
-
SSDEEP
12288:3UdtFdMxDsGf7r63P8b5oxP7SMWsXKjwA78335LhR/fO79s:kdTdM3X24oJlfK8y833dhZ
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-9884-4886-F866-31861488D662} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662}\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.axc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.axc\Clsid\ = "{CC01FC6C-9884-4886-F866-31861488D662}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.axc\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.axc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9884-4886-F866-31861488D662}\ProgID\ = "2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.axc" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31 PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31 PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31 PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31 PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31 PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31 PID 2044 wrote to memory of 2120 2044 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2bd84b9ef17d7491b67fb79dec65925c_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2120
-