Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 20:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3ec71ef02a97b088bb3ea3fa74523323_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3ec71ef02a97b088bb3ea3fa74523323_JaffaCakes118.dll
-
Size
117KB
-
MD5
3ec71ef02a97b088bb3ea3fa74523323
-
SHA1
39998c3ea071cf31d3308b673c8a4358c17b3a97
-
SHA256
ea2a47ce619d892488c910b21380b3f20867528aa5ba1707633a53cc78ddca3b
-
SHA512
be9ade5bc83788679c3df10d7096d21f5d12de43ec6739ae0120d14e6eb3e89afbbbb5040d135522c4d5de18804e46c4384ae3f3f3efa6366f1c43a594935777
-
SSDEEP
1536:TPJIjzTXr1Fe6QTXPdBRLLBPLlM6NsGUCuHa6rEKnDY/r0fzAMxEfJr5Ym4s8SIs:T4MTFPL5m6NG/rjDYg7Ohum38tT+
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98F9C561-D973-414A-99B6-724631C65AA6} regsvr32.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Default = 61c5f99873d94a4199b6724631c65aa6 regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98F9C561-D973-414A-99B6-724631C65AA6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98F9C561-D973-414A-99B6-724631C65AA6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98F9C561-D973-414A-99B6-724631C65AA6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3ec71ef02a97b088bb3ea3fa74523323_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{98F9C561-D973-414A-99B6-724631C65AA6}\InprocServer32\ThreadingModel = "Both" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30 PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30 PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30 PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30 PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30 PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30 PID 2652 wrote to memory of 1736 2652 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3ec71ef02a97b088bb3ea3fa74523323_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3ec71ef02a97b088bb3ea3fa74523323_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1736
-