Analysis
-
max time kernel
136s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 05:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6645d467bed01872034fafeb416eb586_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
6645d467bed01872034fafeb416eb586_JaffaCakes118.dll
-
Size
460KB
-
MD5
6645d467bed01872034fafeb416eb586
-
SHA1
2e155bf3c8e3641bc65a5448de5094e34d0ccc8d
-
SHA256
96ffa5945d925047c5071532a644df390585d5868e9c97a4c2f3044f13de4f6a
-
SHA512
632e782c71d5f79e32286405d9f8334f3fbd922529ae62c70ad43b0051c43136ff91958fc1301f03ccc4c210488a99dd38d840722dcf7d52462c4913ab620d79
-
SSDEEP
6144:oSu6/rShnDfQ7eAFdR5QqLNWjELnPrEBE7xwtCH4i0+GnmTXSgJcfOT1KR0+q0f:ncnM7eAr6jELnPgBEqtCYi0XkXSFt0y
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{58359010-BF36-11D3-99A2-0050DA2EE1BE} regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.IEObject\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.IEObject\CurVer\ = "eZulaAgent.IEObject.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.ToolBarBand.1\CLSID\ = "{55910916-8B4E-4C1E-9253-CCE296EA71EB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0372DC-F552-11D3-8528-0050DAB79376}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8EBB1743-9A2F-11D4-8A7E-0050DA2EE1BE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19DFB2CA-9B27-11D4-B192-0050DAB79376}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58359010-BF36-11d3-99A2-0050DA2EE1BE}\ = "IEObject Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0372DE-F552-11D3-8528-0050DAB79376} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19DFB2CA-9B27-11D4-B192-0050DAB79376} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FD8645F-9B3E-46C1-9727-9837842A84AB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}\ = "TopText" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}\ProgID\ = "EZulaAgent.eZulaCtrlHost.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0372DE-F552-11D3-8528-0050DAB79376}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58359010-BF36-11d3-99A2-0050DA2EE1BE}\VersionIndependentProgID\ = "eZulaAgent.IEObject" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.ToolBarBand regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6645D4~1.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EZulaAgent.PlugProt\CLSID\ = "{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0372DE-F552-11D3-8528-0050DAB79376}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58359010-BF36-11d3-99A2-0050DA2EE1BE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6645D4~1.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}\TypeLib\ = "{58359011-BF36-11d3-99A2-0050DA2EE1BE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0372DE-F552-11D3-8528-0050DAB79376}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.IEObject\ = "IEObject Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}\ProgID\ = "eZulaAgent.ToolBarBand.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EZulaAgent.eZulaCtrlHost\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8EBB1743-9A2F-11D4-8A7E-0050DA2EE1BE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8EBB1743-9A2F-11D4-8A7E-0050DA2EE1BE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0372DC-F552-11D3-8528-0050DAB79376}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}\ = "IIEObject" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FD8645F-9B3E-46C1-9727-9837842A84AB}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.ToolBarBand.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8EBB1743-9A2F-11D4-8A7E-0050DA2EE1BE}\TypeLib\ = "{58359011-BF36-11D3-99A2-0050DA2EE1BE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{19DFB2CA-9B27-11D4-B192-0050DAB79376}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0372DC-F552-11D3-8528-0050DAB79376} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58359010-BF36-11d3-99A2-0050DA2EE1BE}\ProgID\ = "eZulaAgent.IEObject.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EZulaAgent.PlugProt.1\CLSID\ = "{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EZulaAgent.PlugProt\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}\VersionIndependentProgID\ = "EZulaAgent.PlugProt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6645d467bed01872034fafeb416eb586_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4FD8645F-9B3E-46C1-9727-9837842A84AB}\TypeLib\ = "{58359011-BF36-11D3-99A2-0050DA2EE1BE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.ToolBarBand\ = "TopText" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\eZulaAgent.ToolBarBand\CLSID\ = "{55910916-8B4E-4C1E-9253-CCE296EA71EB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EZulaAgent.eZulaCtrlHost.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}\ = "IIEObject" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}\TypeLib\Version = "1.0" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4896 2136 regsvr32.exe 84 PID 2136 wrote to memory of 4896 2136 regsvr32.exe 84 PID 2136 wrote to memory of 4896 2136 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6645d467bed01872034fafeb416eb586_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6645d467bed01872034fafeb416eb586_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4896
-