Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 14:19
Behavioral task
behavioral1
Sample
5c4d2fdd71d0fc03028a8d1aa8873ec1_JaffaCakes118.dll
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
5c4d2fdd71d0fc03028a8d1aa8873ec1_JaffaCakes118.dll
-
Size
434KB
-
MD5
5c4d2fdd71d0fc03028a8d1aa8873ec1
-
SHA1
a7e137cd34dacdee947a9be6604379f42b1aa9cf
-
SHA256
69ef1b568b9c104f90298202f044034b89941aa8c5af4c6e3d0c3c88286741ca
-
SHA512
4f9c250d4b76b08695ad7db23d9806a8a051e09c0de6d16651e1276fc78112bf9c78b260473283f083470d305873bfc6758ebb93764099a4d19d05eff98977a4
-
SSDEEP
12288:ho8hDrtHza8gcEgKJq6xGJOpqqldcBJT+wT9oKqhx:hThDJtegKs0GkprlST+w5odhx
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10a55c19-ca25-c7d5-4ff4-8e695434f30a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10a55c19-ca25-c7d5-4ff4-8e695434f30a}\NoExplorer = "\"\"" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{89c7baaf-d8a4-4018-ed22-c7b9960acb76} regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10a55c19-ca25-c7d5-4ff4-8e695434f30a} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10a55c19-ca25-c7d5-4ff4-8e695434f30a}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\ = "Search panel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10a55c19-ca25-c7d5-4ff4-8e695434f30a}\ = "mysidesearch search enhancer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10a55c19-ca25-c7d5-4ff4-8e695434f30a}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5c4d2fdd71d0fc03028a8d1aa8873ec1_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10a55c19-ca25-c7d5-4ff4-8e695434f30a}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5c4d2fdd71d0fc03028a8d1aa8873ec1_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89c7baaf-d8a4-4018-ed22-c7b9960acb76}\Implemented Categories regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4740 2236 regsvr32.exe 84 PID 2236 wrote to memory of 4740 2236 regsvr32.exe 84 PID 2236 wrote to memory of 4740 2236 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5c4d2fdd71d0fc03028a8d1aa8873ec1_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5c4d2fdd71d0fc03028a8d1aa8873ec1_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:4740
-