Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 01:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
59e2e74d98ef263e67d9aa373273fbb9_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
59e2e74d98ef263e67d9aa373273fbb9_JaffaCakes118.dll
-
Size
232KB
-
MD5
59e2e74d98ef263e67d9aa373273fbb9
-
SHA1
47007815cbba06349352bd15626bef73cc040b5c
-
SHA256
cf9f8af4759f8b48c1893bed36c93f17f637eb3a4334bd0623e32c8173e0273c
-
SHA512
8bf3fed6a79baae9b0b5232ab630e536bb1e6f0e649b49f8434c439fd152ab237a4334ce8b321056329cbf2c347f011d3ce27c282570e711607a7f789e86b140
-
SSDEEP
3072:492bqz9GF2ZE7kLzp/Vcl/JAqAIAVo9A3OQEZm+pgAB9upKMroTsYaxSmLBlwNyw:AdZGRRXPhga9u4MMaxBbGV/C
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8} regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\wversion = "4.0.9" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\59e2e74d98ef263e67d9aa373273fbb9_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\webbrowser = "{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{686488AF-13D5-9DDF-4FEF-9FB88698CFC1}\InprocServer32\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AAB6C1A0-F3A4-4DAC-A922-F82E601E73A8}\ = "JavaSunSurf Class" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 920 1968 regsvr32.exe 84 PID 1968 wrote to memory of 920 1968 regsvr32.exe 84 PID 1968 wrote to memory of 920 1968 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\59e2e74d98ef263e67d9aa373273fbb9_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\59e2e74d98ef263e67d9aa373273fbb9_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:920
-