Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 23:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
59a3214b7bbf0efc8df7c7d7639b9146_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
59a3214b7bbf0efc8df7c7d7639b9146_JaffaCakes118.dll
-
Size
1.8MB
-
MD5
59a3214b7bbf0efc8df7c7d7639b9146
-
SHA1
d86c66c01c904194ba5811c8ecf8add4d9b914d2
-
SHA256
f7abf06d0a9f1d1f8443194f16251bec351b93599635eb839cda21a03c303cff
-
SHA512
8d103c8f1b96fe14390afba45c7e51204fe14f59133246f778243d2aa6399fbe2ec9f63171480de4d46e4beedcf0477f4149439781a485a4cc4b873fdffcc011
-
SSDEEP
49152:I5nvmyeQ805TO9GaIkgr4iotH29eb31hTuJ/TOHgaA:iTZ805TO9GaIkgr4iA29eDy/TOHg
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{018c15eb-0687-7ee1-12cc-316a27e8fbb3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{018c15eb-0687-7ee1-12cc-316a27e8fbb3}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{018c15eb-0687-7ee1-12cc-316a27e8fbb3}\ = "fruttinet" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{018c15eb-0687-7ee1-12cc-316a27e8fbb3}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{018c15eb-0687-7ee1-12cc-316a27e8fbb3}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\59a3214b7bbf0efc8df7c7d7639b9146_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{018c15eb-0687-7ee1-12cc-316a27e8fbb3}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{018c15eb-0687-7ee1-12cc-316a27e8fbb3} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2184 2492 regsvr32.exe 86 PID 2492 wrote to memory of 2184 2492 regsvr32.exe 86 PID 2492 wrote to memory of 2184 2492 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\59a3214b7bbf0efc8df7c7d7639b9146_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\59a3214b7bbf0efc8df7c7d7639b9146_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2184
-