Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
405a29cd83b73d2dc31c87b2e148c81b_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
405a29cd83b73d2dc31c87b2e148c81b_JaffaCakes118.dll
-
Size
656KB
-
MD5
405a29cd83b73d2dc31c87b2e148c81b
-
SHA1
5f1d89088d410325bd97367d2a123bdeea84b34e
-
SHA256
841aa30264a1f0fba852fb5261cc6aee2b64f3e6b30171cb0e89dbeb0278de53
-
SHA512
6e7ca5f0a116ffbbf67acab60220f977623c19ef897238508bde5bc465a815ff59669ea54e2930b2cc43ed0eeb3609d8053879574f27e618f24793567cff92a1
-
SSDEEP
12288:TWfcfMmPNygLGZlQnBJWFZ/9hjAUpL1wj3048OMaVZfLXzQTNtUfDSRYEP:qEfnygu+BIFZ/9hMUd1wjrX8TNtX3P
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{21da0c07-666e-b02c-fb5a-de3ec52b102c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{21da0c07-666e-b02c-fb5a-de3ec52b102c}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21da0c07-666e-b02c-fb5a-de3ec52b102c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21da0c07-666e-b02c-fb5a-de3ec52b102c}\ = "milehighads" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21da0c07-666e-b02c-fb5a-de3ec52b102c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21da0c07-666e-b02c-fb5a-de3ec52b102c}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\405a29cd83b73d2dc31c87b2e148c81b_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21da0c07-666e-b02c-fb5a-de3ec52b102c}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2836 wrote to memory of 5036 2836 regsvr32.exe 83 PID 2836 wrote to memory of 5036 2836 regsvr32.exe 83 PID 2836 wrote to memory of 5036 2836 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\405a29cd83b73d2dc31c87b2e148c81b_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\405a29cd83b73d2dc31c87b2e148c81b_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:5036
-