Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll
-
Size
248KB
-
MD5
2d14561a958de99a2ec202b8713ba3f0
-
SHA1
8c2a30e5839b741e980c3dc1e58f8797266936f0
-
SHA256
493859e049a43ce72e8bf273c863fce0d54e71fd61dc0d4d9a1ba672d0b12d11
-
SHA512
82ff27ffb88180715073eb0d080d9585e2aa38e763c84c0f5e463c955ca4c0ad981c6310d0f8dda7c3f36a5cb6844a5fde30983dd862491bd86a19e97398d580
-
SSDEEP
6144:hhp4CW6AL00rKFo+KOxWe02XeayT+2s4G67+jmddQ76L7KrIIYvYBjN9O4bzwaGb:hzLpxa1IHQifBtYz
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\Windows\\system32\\ctfmonxyz.exe" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F4F11FD8-10EF-364B-91EE-0351F474BCA2} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\IExplore = "1" regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctfmonxyz.exe regsvr32.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\VersionIndependentProgID\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID\ = "{F4F11FD8-10EF-364B-91EE-0351F474BCA2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\ProgID\ = "D.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\TypeLib\ = "{0EAF47D9-D169-3A33-A127-A69FA28E8920}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\TypeLib\ = "{0EAF47D9-D169-3A33-A127-A69FA28E8920}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID\ = "{F4F11FD8-10EF-364B-91EE-0351F474BCA2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\ = "LIB" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F4F11FD8-10EF-364B-91EE-0351F474BCA2}\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EAF47D9-D169-3A33-A127-A69FA28E8920}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3385DA0-7743-31C3-85EE-C3FDF4469BAA}\TypeLib\Version = "1.0" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2696 2668 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
PID:2696
-