Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll
-
Size
19KB
-
MD5
7288f61157002a3bfada7e64dcaa6ba6
-
SHA1
3a224c1fc5d0bf627f0d4a697d12d72bfcbb1538
-
SHA256
63b3043257752c02f9f4f181465d6db6b8e9adade32d64e5cffbd6eb828b3a7c
-
SHA512
1bfaedde74985e02c820fe1f474af60cbf2e9959cc2df971b7bf7dc7bade89d7ccf2f903875883dbf62997e011b3c7a8b436049d8a1e7108d347ca7ce117fe92
-
SSDEEP
384:WT/IZpVADCzGUtyKclV2zf3YZi+fUMA77lzImBY7WwsW58JWAECrD5i:WDgPAG3cl3s+fszp+8JWAECc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ = "_ShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\ = "pIContextMenu.ShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\VERSION regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ = "ShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\TypeLib\ = "{C627D83F-3357-4250-B1A5-AA13E249983D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\ProgID\ = "pIContextMenu.ShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\TypeLib\ = "{C627D83F-3357-4250-B1A5-AA13E249983D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ = "_ShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt\Clsid\ = "{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\pIContextMenu.ShellExt\ = "pIContextMenu.ShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\TypeLib\ = "{C627D83F-3357-4250-B1A5-AA13E249983D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3D3E83EA-EBB1-4C65-BF57-66B99DC334A1}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\ = "IContextMenu Shell Extension.." regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{C627D83F-3357-4250-B1A5-AA13E249983D}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{646F5C60-65CC-4B46-B994-CD4BE8BC4CF8}\TypeLib regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29 PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29 PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29 PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29 PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29 PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29 PID 1540 wrote to memory of 2500 1540 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7288f61157002a3bfada7e64dcaa6ba6_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2500
-