Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 00:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
329b22f3ac69564ca8ef059344c1721d_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
329b22f3ac69564ca8ef059344c1721d_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
329b22f3ac69564ca8ef059344c1721d
-
SHA1
9120c62ceb251c15aaa86ba868db340ffee5b4c1
-
SHA256
0ed836895f48a90114f62e4442e4382e848235eae5be70aa0cf89355ad846ea0
-
SHA512
dca1d7582f92f3a44f09fa9864426c76e342a6f3121c3df51235803bd46e0ba767efc667bb35bff8338e8e9fbf92b0f25b59bcdfad207c1b625d4e74ca9bf23f
-
SSDEEP
12288:t3fK0eTf8SevjNyCqmM+ffguTEpSuC04lBZuF/IUTUmVh8QhenETlCcN9Pkk660b:By0CHIyChyj7bYrUT1Vh/GETUYmu7i
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{30C7046A-919D-4927-966F-A7D8A93C3BDD} regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30C7046A-919D-4927-966F-A7D8A93C3BDD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30C7046A-919D-4927-966F-A7D8A93C3BDD}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30C7046A-919D-4927-966F-A7D8A93C3BDD}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30C7046A-919D-4927-966F-A7D8A93C3BDD}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\329b22f3ac69564ca8ef059344c1721d_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{30C7046A-919D-4927-966F-A7D8A93C3BDD}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30 PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30 PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30 PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30 PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30 PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30 PID 2548 wrote to memory of 2204 2548 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\329b22f3ac69564ca8ef059344c1721d_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\329b22f3ac69564ca8ef059344c1721d_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2204
-