Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.dll
-
Size
608KB
-
MD5
6f3c1730a824de39b0e2ca11d46cb730
-
SHA1
0c802f700e13c0df77109b21aa9209f0702fcce7
-
SHA256
94ae117e606a9ab3bd35130e37fe27e7a1f7cd5a6c6ee6374c971f2536cd144c
-
SHA512
6b4b82b2122fd790e7a61ed728e0c06ffe63e0c97b88bcd00ae9c82fb6c8685cf6f0709ab614271ae55508ef61e6e021d2802d1931ec5af7c9063e04bc15f7cf
-
SSDEEP
12288:TpIt9HX65cspWkY5DARyLuaIg3QaoTrdnsN904/:TetFXsoB7LGnaoTrs904
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}\ = "iwc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.iwc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.iwc\ = "iwc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}\ProgID\ = "6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.iwc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.iwc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.iwc\Clsid\ = "{CC01FC6C-ADC7-C2AB-C49B-89C786B86CB8}" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4496 1060 regsvr32.exe 84 PID 1060 wrote to memory of 4496 1060 regsvr32.exe 84 PID 1060 wrote to memory of 4496 1060 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6f3c1730a824de39b0e2ca11d46cb730_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496
-