Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 17:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll
-
Size
232KB
-
MD5
42b3c8131093a75daa9bcc0306c203fd
-
SHA1
ebe270da9b22c04ebe7fd1130666d18a9bb4130a
-
SHA256
ac5bed1a68e2642fe240875cceba0818d6fb07a9ee59e8ae215e570b56f114c1
-
SHA512
672eebefa52760b318d41cd26c98ccb2ca442205626ba2bb32580d22858ef0914ceccdf95ae843a12080bbdbccc27676c00beefce732af7cf9e825f7ba7dbe20
-
SSDEEP
3072:RU6tpX9FcKEDHX35bfBNwrB+N1YpzkFnPyrKIumsY+sRLGxSTWdJn5nRtNyoMfq6:zPVRKIuk1GxFdJn5nR3efqEr3
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8} regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\wversion = "4.1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32\ regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\ = "JavaSunSurf Class" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\webbrowser = "{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3460 1512 regsvr32.exe 83 PID 1512 wrote to memory of 3460 1512 regsvr32.exe 83 PID 1512 wrote to memory of 3460 1512 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3460
-