Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 11:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.dll
-
Size
551KB
-
MD5
5bbd2e5bd81ffb8918716ef8001327f1
-
SHA1
f565a28f7ddf8e721d942e3939e63a35cec3d010
-
SHA256
2253c63e3554b89d5860448147cb2c6d591d586654e89e0ad0dceb3ad76c17d1
-
SHA512
6eda2c5024cd0e99e3d3084390bf86b001e98c5ced2257f708583d6724e20f45c97e7db0acc7cb68487c4cf6b6095aa8d92da757790785a0d377df41b8c4f82b
-
SSDEEP
6144:6Xg4MAR02cvZUpXW7NQOCd1hWp/n0RYvUBZK8CqAEyEpC9Ky7kiYTtoIwVdmldBX:8fM40BiXWxoLhFGNz2CIZoI/lvshT1W
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{03C12478-A0D3-4291-A535-F6D16BA08D68} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.XunBHoSwf regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.XunBHoSwf\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68}\ = "ExSwfTrc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68}\ProgID\ = "5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.XunBHoSwf" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03C12478-A0D3-4291-A535-F6D16BA08D68}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.XunBHoSwf\ = "ExSwfTrc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.XunBHoSwf\Clsid\ = "{03C12478-A0D3-4291-A535-F6D16BA08D68}" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1500 wrote to memory of 4176 1500 regsvr32.exe 86 PID 1500 wrote to memory of 4176 1500 regsvr32.exe 86 PID 1500 wrote to memory of 4176 1500 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5bbd2e5bd81ffb8918716ef8001327f1_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4176
-