Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 03:13
Behavioral task
behavioral1
Sample
3bca89d67339d972bbd6906948d2738c_JaffaCakes118.dll
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
3bca89d67339d972bbd6906948d2738c_JaffaCakes118.dll
-
Size
748KB
-
MD5
3bca89d67339d972bbd6906948d2738c
-
SHA1
dbdd7edef9c6cc09302b0952d1c2d48a9fa1bf6a
-
SHA256
1c4b221499bd58a2f1a7c8e07ddaaa8a053f4ccd23d78323e0dfa0f5b9221580
-
SHA512
6fe70dba9b0bf454ec3d7010cd21937dfbe34d869e967c2eb6b2dd2c5dc8f9eefd5c02164b342dfaaf015398cadc363a5d9b5c7db488fb3b94f2e81bf862f293
-
SSDEEP
12288:EBU8cxdgHWMkSMs0jgx8RX7r3SgyXIKcOzN+IldpxvhvviFbJgdm8TIxAqO7WHfn:I2MkSWW4X7ZKcyrpxvh1UdOAn
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB}\ = "Banco do Brasil S.A." regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3bca89d67339d972bbd6906948d2738c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCAAAC14-BC46-40CA-9CB2-CBB12C6739EB}\ = "GbiehObj Class" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4596 regsvr32.exe Token: SeSecurityPrivilege 4596 regsvr32.exe Token: SeTakeOwnershipPrivilege 4596 regsvr32.exe Token: SeLoadDriverPrivilege 4596 regsvr32.exe Token: SeSystemProfilePrivilege 4596 regsvr32.exe Token: SeSystemtimePrivilege 4596 regsvr32.exe Token: SeProfSingleProcessPrivilege 4596 regsvr32.exe Token: SeIncBasePriorityPrivilege 4596 regsvr32.exe Token: SeCreatePagefilePrivilege 4596 regsvr32.exe Token: SeShutdownPrivilege 4596 regsvr32.exe Token: SeDebugPrivilege 4596 regsvr32.exe Token: SeSystemEnvironmentPrivilege 4596 regsvr32.exe Token: SeRemoteShutdownPrivilege 4596 regsvr32.exe Token: SeUndockPrivilege 4596 regsvr32.exe Token: SeManageVolumePrivilege 4596 regsvr32.exe Token: 33 4596 regsvr32.exe Token: 34 4596 regsvr32.exe Token: 35 4596 regsvr32.exe Token: 36 4596 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4596 2180 regsvr32.exe 83 PID 2180 wrote to memory of 4596 2180 regsvr32.exe 83 PID 2180 wrote to memory of 4596 2180 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3bca89d67339d972bbd6906948d2738c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3bca89d67339d972bbd6906948d2738c_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4596
-