Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 18:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll
-
Size
447KB
-
MD5
3a4e9a4ae3810698d90cfccc40d4a9b6
-
SHA1
b99db906a9a896a8122de6913c35e9fc603e68ae
-
SHA256
3e893d2dca838be4a06344684e09ae89fc321c25418055a1ba13854a83ba1f04
-
SHA512
c63f19161c5d3421afcdf27f8ef87b8c8a693a4172196122ebf01218ce535c50fd63be7e48977454dc65f4456c0bfcf8b5dcc4e6fe29858120654ca4879085d8
-
SSDEEP
6144:t7xlMsR4E8AspZzgcSTkmXuOp+vOrj+hMG7c4J5Eq4YjjewWJM2gEu16RVDlpfbO:3ZiSZc0luOpKjcpLSjRb6brgtV
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B15155BF-797C-4DF6-B73C-2875ED9831C6} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\iexplore.exe = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31 PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31 PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31 PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31 PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31 PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31 PID 2284 wrote to memory of 2324 2284 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2324
-