Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 06:17
Behavioral task
behavioral1
Sample
489257a29cfd4d762797bf859e29abd0_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
489257a29cfd4d762797bf859e29abd0_JaffaCakes118.dll
-
Size
191KB
-
MD5
489257a29cfd4d762797bf859e29abd0
-
SHA1
6c5095c22ff0aeaac7ba8d6082e8ad45d4fcbf05
-
SHA256
f9fc43da31a6fe74cc7487630d843029b4148ffcf3aacc2d4cc339b8f5161240
-
SHA512
7fecd916c5418020359c2a34cdce3a26e54da344d9090ce4f6bb624bb2437bf468b0c09cbf8b142cfcdd302fc78661f052da08512672848490e84cfa422c43aa
-
SSDEEP
3072:biyUumlsxZ1Icv6yYZAzCbWWDC1JL+O1w0dbyfCL954qX3GBUSM5J4cZ6x99XQJ:bwuks6cvbYGzCDDwL+O1Ppz4hBUhGcZx
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\ regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.msrtge\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.msrtge\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.msrtge\Clsid\ = "{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\ProgID\ = "489257a29cfd4d762797bf859e29abd0_JaffaCakes118.msrtge" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.msrtge regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{47CFDDF9-6FBD-4C06-8753-24FEFBA10D59}\InprocServer32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2536 1640 regsvr32.exe 85 PID 1640 wrote to memory of 2536 1640 regsvr32.exe 85 PID 1640 wrote to memory of 2536 1640 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\489257a29cfd4d762797bf859e29abd0_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2536
-