Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 19:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.dll
-
Size
634KB
-
MD5
3a7510bd351a2ef0dc59ebcd626cb120
-
SHA1
710e4c2b4892ee249adf1241e124f5c0f827f388
-
SHA256
1497bc80348020db46a54ef7c635d2ba061bde736275f10a7bab45485a24844b
-
SHA512
00072bbddebac5afeed9f17b0a92966c93b9f814b03d3fa06715379dee8042d50869f9b02ebaac1a0067fcc8160e973a76e616d5eb0ba1aaca869eb3ef443ee8
-
SSDEEP
12288:uM0t9FNcxDMmfrLAF8rZIRf2MmsXaFwsQXFhJ/fO79s:GtjNcXnVInvaWsyhh
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}\ = "axc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.axc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.axc\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.axc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.axc\Clsid\ = "{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8DA6-5845-59DC-88BEE4585FDA}\ProgID\ = "3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.axc" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1668 wrote to memory of 4272 1668 regsvr32.exe 83 PID 1668 wrote to memory of 4272 1668 regsvr32.exe 83 PID 1668 wrote to memory of 4272 1668 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3a7510bd351a2ef0dc59ebcd626cb120_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4272
-