Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll
-
Size
204KB
-
MD5
467a4fb220804b8e55e8a5607845aa01
-
SHA1
02b43611a22a86c79fdc26ebbee481e96fc86251
-
SHA256
796423297a599658e7f73279a451cc29a50f5ab0eeef9901f508c7aa8e553e1f
-
SHA512
97966a7b01b263bc9a6e8ae2eb0694ba6a3ed89fb1807db9ea1a903958efd3f821641f7c7fd0ffef989459563e66cd4c4a51ff77072a236d4bcf321ce20474e0
-
SSDEEP
3072:qSAXYRcakWwIzKLi9nYqXRuIjkz8Yg4eBlBsDS9E:wXYeuKL+YMR1yY4YE
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NamesToolbar = "C:\\Program Files\\NamesToolbar\\ToolBarUpdate.exe" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BB860A3D-761F-448B-B937-72B7C09C36FF} regsvr32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Main\EnableSearchPane = "1" regsvr32.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\ = "DigitalNames Pro7" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr.1\ = "DigitalNames Pro7" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr\CurVer\ = "addr.addr.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\VersionIndependentProgID\ = "addr.addr" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\ = "IIEHlprObj" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr\ = "addr Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\ProgID\ = "addr.addr.1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\TypeLib\ = "{BB860A30-761F-448B-B937-72B7C09C36FF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\TypeLib\ = "{BB860A30-761F-448B-B937-72B7C09C36FF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr.1\CLSID\ = "{BB860A3D-761F-448B-B937-72B7C09C36FF}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\ = "IEHelper 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\addr.addr regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BB860A48-761F-448B-B937-72B7C09C36FF}\TypeLib\Version = "1.0" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB860A3D-761F-448B-B937-72B7C09C36FF}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BB860A30-761F-448B-B937-72B7C09C36FF}\1.0\FLAGS\ = "0" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1584 1648 regsvr32.exe 83 PID 1648 wrote to memory of 1584 1648 regsvr32.exe 83 PID 1648 wrote to memory of 1584 1648 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\467a4fb220804b8e55e8a5607845aa01_JaffaCakes118.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:1584
-