Analysis
-
max time kernel
96s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
625b308e299690543ef0eab3f9caef44_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
625b308e299690543ef0eab3f9caef44_JaffaCakes118.dll
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
625b308e299690543ef0eab3f9caef44_JaffaCakes118.dll
-
Size
64KB
-
MD5
625b308e299690543ef0eab3f9caef44
-
SHA1
b397e16f26692e06890b08a0893c37119ec369b3
-
SHA256
199d3274092ca8180d3751ab52c20a05128f09e1da31bc73a4d991b97d95eed1
-
SHA512
c6902c3116cfae4eca3b50917e71b688b61b10f565edc199246629e2970d310397ade52728d8e73d12bb074321d6c84509d698479720b93354da6e74e906a88a
-
SSDEEP
768:qSG4nvXQ6nhFonQGTNrfIXyWqDKHoywCz7++xshkgVNtlz/c+uDhJw8:quTGTNrDbJ9+uFDtlbc+uDh
Score
1/10
Malware Config
Signatures
-
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\DWRCShell\ = "{D3F9CF10-424C-4678-9A28-B0F62D2550DD}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3F9CF10-424C-4678-9A28-B0F62D2550DD}\ = "DWRCShell" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3F9CF10-424C-4678-9A28-B0F62D2550DD}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3F9CF10-424C-4678-9A28-B0F62D2550DD}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DWRCShell\ = "{D3F9CF10-424C-4678-9A28-B0F62D2550DD}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\DWRCShell\ = "{D3F9CF10-424C-4678-9A28-B0F62D2550DD}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\DWRCShell regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3F9CF10-424C-4678-9A28-B0F62D2550DD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3F9CF10-424C-4678-9A28-B0F62D2550DD}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\625b308e299690543ef0eab3f9caef44_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\software\classes\WOW6432Node\clsid\DWRCShell regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\DWRCShell regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4332 2204 regsvr32.exe 83 PID 2204 wrote to memory of 4332 2204 regsvr32.exe 83 PID 2204 wrote to memory of 4332 2204 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\625b308e299690543ef0eab3f9caef44_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\625b308e299690543ef0eab3f9caef44_JaffaCakes118.dll2⤵
- Modifies registry class
PID:4332
-