Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 17:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.dll
-
Size
654KB
-
MD5
2d2da24a9bf4e9705f6f592fe301cc1f
-
SHA1
371808dd8f7928e95b8191fa98b0e326d33f3339
-
SHA256
431d1b0e28946620b3d8103ef368b67d3b9e2580a3e1df7a03483db74afb39f3
-
SHA512
09a0e6c08ff812986e13a70eed67263e9f4f5c956828b014e2bb9b6537495eb642d202fbfce54d3ae0a1f6f7a66c2cee9d00aa556066c3271e866f56aa9db9d0
-
SSDEEP
12288:Xtv1W0IFGiS5JeprW70QxcPJHRFLL+p6r0k2JC1RW8QdHCqmoRIBMn4lUy1QcknY:9M0PiQ85xRJ+U0Dy0goRIBM+iv6O
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.sb\ = "sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}\ = "sb" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.sb regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.sb\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.sb\Clsid\ = "{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-CEB3-D5D5-7843-2292DA46E684}\ProgID\ = "2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.sb" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 864 wrote to memory of 3944 864 regsvr32.exe 82 PID 864 wrote to memory of 3944 864 regsvr32.exe 82 PID 864 wrote to memory of 3944 864 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2d2da24a9bf4e9705f6f592fe301cc1f_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3944
-