Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll
-
Size
162KB
-
MD5
3f809e87a6b2447294e4c086bae3145f
-
SHA1
dbe8be31d0b593863921bfaf8ee329620b210c9b
-
SHA256
2695c3ce481d2e54a8feddcae6bca5cdb24fc4b024623232a1e9dcb4561da28b
-
SHA512
c1db0c84d05b96fe20a7a67c118a2a2e408a5592e1842eaea9948a90969f4d9ada2af628f06c4a684fef60145c4f497b0c377d2c3963c4dc2ecd587cee0579dc
-
SSDEEP
3072:DpN0o1OmkQm+JJ1/dd6gvBwPp9QTeo8eoxwr/ELoGyMv59:DpDOmkZ+JJF1vBwPpZxxwrcUkb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{09d70dc3-cdf4-d34c-4496-9da088d1ef47} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll\" DllStub" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81}\ = "agadoo browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a2b74aab-ee67-8b12-0beb-46ea7e0bbb81}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29 PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29 PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29 PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29 PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29 PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29 PID 2452 wrote to memory of 2812 2452 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3f809e87a6b2447294e4c086bae3145f_JaffaCakes118.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2812
-