Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll
-
Size
159KB
-
MD5
3a51b562c605de035c1df2f11e464eb6
-
SHA1
996975a1c5b74b5c40951710ac1036af98ca480c
-
SHA256
fb61ae830e3d322240dc8da3fb7187c92ebb3892ebfc6bec5a7f90fc339d1d9b
-
SHA512
c841a66f90943630b6a6fb0e00eb4719e6fcd550eb178245efa45343145e341eeaa69e7bae2b6aa08f0f28f42703d9415fd71cb75551bc7671ed238b14c0b283
-
SSDEEP
3072:JW6wwSL4ApBi0coh4u5Bl+kyq5c3GNqy4v5N:cLLrDi0coh4u5sq5Lmb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\{46112c92-8125-7614-6a6a-9f9086d517bc} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll\" DllStub" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3}\ = "giantads browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7c7f5d0d-19a6-efe4-7e5e-263329caabf3}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2328 wrote to memory of 456 2328 regsvr32.exe 83 PID 2328 wrote to memory of 456 2328 regsvr32.exe 83 PID 2328 wrote to memory of 456 2328 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3a51b562c605de035c1df2f11e464eb6_JaffaCakes118.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:456
-