Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 04:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
483b3082167e4cc1cc4d14ed692a39d6_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
483b3082167e4cc1cc4d14ed692a39d6_JaffaCakes118.dll
-
Size
452KB
-
MD5
483b3082167e4cc1cc4d14ed692a39d6
-
SHA1
89aa811448794e2cca9c22dae72759498ef4d036
-
SHA256
477ca2bb933b7d3f42bc2752c850480cc9002dc843efac14048aae8ed76a13d5
-
SHA512
f9d35ad4b7757beed5a490913a0f0916e3702ce58b5cabf7edd6ad90e5bf0ffa23136a0fef4444ef767727b2df7d5784e47d11b636a74e614129b6eaee50cd5b
-
SSDEEP
12288:ukx2OPVx09EzL1B2hcIcvzrhgdY/S46JkXO3:hx22xqEzL1ZhbtgdY/S46JkXO
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9612852A-68FF-896D-7589-B2D6337D5E3D} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{9612852A-68FF-896D-7589-B2D6337D5E3D}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Explorer Bars\{E7768E57-FF73-7CC4-5FAB-C642858306C7} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{E7768E57-FF73-7CC4-5FAB-C642858306C7} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9612852A-68FF-896D-7589-B2D6337D5E3D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9612852A-68FF-896D-7589-B2D6337D5E3D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9612852A-68FF-896D-7589-B2D6337D5E3D}\ = "bignetdaddy search enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9612852A-68FF-896D-7589-B2D6337D5E3D}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9612852A-68FF-896D-7589-B2D6337D5E3D}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\483b3082167e4cc1cc4d14ed692a39d6_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\ = "Search panel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\483b3082167e4cc1cc4d14ed692a39d6_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7768E57-FF73-7CC4-5FAB-C642858306C7}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31 PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31 PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31 PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31 PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31 PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31 PID 1968 wrote to memory of 2332 1968 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\483b3082167e4cc1cc4d14ed692a39d6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\483b3082167e4cc1cc4d14ed692a39d6_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:2332
-