Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll
-
Size
553KB
-
MD5
3e7e1e4be3743aa1dcdfb4855361eaaa
-
SHA1
17f350f8a6eee8dc99dd84d6d380f7ca6c1a641b
-
SHA256
439202af5e70b2ca14cab29bfb8e90ce4be31c829b79728e1dbf344e01c96d04
-
SHA512
05a9639e26058010daa61c77b77a20b9bbdf1d2dae477aab66aa7e3ccf4e66d059c6045ad34906efaeb878b19e79ea64b803e860ffd8f015a7f244f1ba62e695
-
SSDEEP
12288:Uwcu7OXseaDMe0Pxdt27mK/zYsLR3T8Nk0evAp0URIC6sMlmSd:UwR+seaDMe0PxdQLR3juP2Zs0b
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{32AF64F7-4F4E-1EAD-2364-84D07503693A} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\ = "Search panel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\ = "searchersmart search enhancer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{02A84255-2F4A-367E-11C4-D5AEB4B43AB3}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32AF64F7-4F4E-1EAD-2364-84D07503693A}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 2816 3184 regsvr32.exe 83 PID 3184 wrote to memory of 2816 3184 regsvr32.exe 83 PID 3184 wrote to memory of 2816 3184 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3e7e1e4be3743aa1dcdfb4855361eaaa_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2816
-