Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 08:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.dll
-
Size
680KB
-
MD5
3ca9a6cd77f55a1252f974f1b27d49c5
-
SHA1
9bb10339a28a31ab4619a4db0aeb1ac9222ec02c
-
SHA256
97da25b2b047216b5f4e8ef41579597c541fd7a5307b390f4649031ebfd74b48
-
SHA512
97c888255e96c3e2cb21f4a2e8ad3da0605bba1421559be1037a612905096a13b0c651c2d48492cc18b493488b6e62c98225af20097d38111755990c890a266c
-
SSDEEP
12288:Qd8XIy8eDudnnJHjxF/Tt0HARqd1hPHJcRG8ziTLQFC6rEx+SOFKn/fO79s:QuYyRD0JHjBHqVPHJcRG8zivQFC6rEok
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.axc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.axc\Clsid\ = "{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}\ProgID\ = "3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.axc\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.axc\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-8141-1477-2AAA-CEEF71FB952B}\ProgID regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4572 4040 regsvr32.exe 83 PID 4040 wrote to memory of 4572 4040 regsvr32.exe 83 PID 4040 wrote to memory of 4572 4040 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3ca9a6cd77f55a1252f974f1b27d49c5_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4572
-