Analysis
-
max time kernel
95s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 18:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll
-
Size
447KB
-
MD5
3a4e9a4ae3810698d90cfccc40d4a9b6
-
SHA1
b99db906a9a896a8122de6913c35e9fc603e68ae
-
SHA256
3e893d2dca838be4a06344684e09ae89fc321c25418055a1ba13854a83ba1f04
-
SHA512
c63f19161c5d3421afcdf27f8ef87b8c8a693a4172196122ebf01218ce535c50fd63be7e48977454dc65f4456c0bfcf8b5dcc4e6fe29858120654ca4879085d8
-
SSDEEP
6144:t7xlMsR4E8AspZzgcSTkmXuOp+vOrj+hMG7c4J5Eq4YjjewWJM2gEu16RVDlpfbO:3ZiSZc0luOpKjcpLSjRb6brgtV
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B15155BF-797C-4DF6-B73C-2875ED9831C6} regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\iexplore.exe = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 408 wrote to memory of 4164 408 regsvr32.exe 83 PID 408 wrote to memory of 4164 408 regsvr32.exe 83 PID 408 wrote to memory of 4164 408 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3a4e9a4ae3810698d90cfccc40d4a9b6_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:4164
-