Overview
overview
10Static
static
319b15bd216...18.exe
windows7-x64
1019b15bd216...18.exe
windows10-2004-x64
10$APPDATA/c...OR.dll
windows7-x64
1$APPDATA/c...OR.dll
windows10-2004-x64
1$APPDATA/c...ce.exe
windows7-x64
1$APPDATA/c...ce.exe
windows10-2004-x64
1$APPDATA/p...ils.js
windows7-x64
3$APPDATA/p...ils.js
windows10-2004-x64
3$TEMP/System.dll
windows7-x64
3$TEMP/System.dll
windows10-2004-x64
3$TEMP/hedgerows.dll
windows7-x64
3$TEMP/hedgerows.dll
windows10-2004-x64
3$TEMP/pl/r...ox.vbs
windows7-x64
1$TEMP/pl/r...ox.vbs
windows10-2004-x64
1$TEMP/pl/r...ps.dll
windows7-x64
3$TEMP/pl/r...ps.dll
windows10-2004-x64
3Analysis
-
max time kernel
8s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
19b15bd216a75333053517cd4e4afe3d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
19b15bd216a75333053517cd4e4afe3d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$APPDATA/channelName/missingtrackvolume/struct/MFC80KOR.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$APPDATA/channelName/missingtrackvolume/struct/MFC80KOR.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$APPDATA/channelName/missingtrackvolume/struct/SystemDeploymentFrameworkService.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$APPDATA/channelName/missingtrackvolume/struct/SystemDeploymentFrameworkService.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$APPDATA/position/advanced/children/savemode/event-utils.js
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$APPDATA/position/advanced/children/savemode/event-utils.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$TEMP/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$TEMP/System.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral11
Sample
$TEMP/hedgerows.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$TEMP/hedgerows.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral13
Sample
$TEMP/pl/rule/inline/NotificationBox.vbs
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$TEMP/pl/rule/inline/NotificationBox.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$TEMP/pl/rule/inline/vjscsvrps.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$TEMP/pl/rule/inline/vjscsvrps.dll
Resource
win10v2004-20240709-en
General
-
Target
$TEMP/pl/rule/inline/vjscsvrps.dll
-
Size
11KB
-
MD5
7217cd683c6cfd0cfbd35dc0d6ecbc7c
-
SHA1
e26dc3d907758f90ec18140221ebe7ee98028649
-
SHA256
e005228d21dd9494ebdc890a1617aed9633c653ee4d858df5c99967edaad3ad2
-
SHA512
862231656b60456005d5c63f9cd9764bfbc73c36074d772761fe68c29673f270694136000d1812741f8bdca909706ae2968ae387b5395058b6e311e3838a42e1
-
SSDEEP
192:aWFD1PrY6z4jA7NJ5kqWFyN3X0S6vrktmGq9AerWHfN9HWN9oHL:a4xPzzOA7hkq4GES6W4WH19HWfq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF319E3-7E41-4C20-B1C9-47EB4205B276} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\ = "PSFactoryBuffer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E5-7E41-4C20-B1C9-47EB4205B276} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$TEMP\\pl\\rule\\inline\\vjscsvrps.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E5-7E41-4C20-B1C9-47EB4205B276}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E6-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E6-7E41-4C20-B1C9-47EB4205B276}\ = "IAnalyzerCallBack" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E4-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32\ = "{3DF319E3-7E41-4C20-B1C9-47EB4205B276}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E5-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32\ = "{3DF319E3-7E41-4C20-B1C9-47EB4205B276}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\ = "IVJCCaller" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E5-7E41-4C20-B1C9-47EB4205B276}\ = "IComWrapCallBack" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E6-7E41-4C20-B1C9-47EB4205B276} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E6-7E41-4C20-B1C9-47EB4205B276}\NumMethods\ = "9" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\NumMethods\ = "8" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E4-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E6-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32\ = "{3DF319E3-7E41-4C20-B1C9-47EB4205B276}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E6-7E41-4C20-B1C9-47EB4205B276}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E3-7E41-4C20-B1C9-47EB4205B276} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32\ = "{3DF319E3-7E41-4C20-B1C9-47EB4205B276}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E4-7E41-4C20-B1C9-47EB4205B276} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E4-7E41-4C20-B1C9-47EB4205B276}\ = "IVJCCallerForUpgrade" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E3-7E41-4C20-B1C9-47EB4205B276}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E4-7E41-4C20-B1C9-47EB4205B276}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E4-7E41-4C20-B1C9-47EB4205B276}\NumMethods\ = "8" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E5-7E41-4C20-B1C9-47EB4205B276}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3DF319E5-7E41-4C20-B1C9-47EB4205B276}\NumMethods\ = "5" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29 PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29 PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29 PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29 PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29 PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29 PID 2548 wrote to memory of 2504 2548 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\$TEMP\pl\rule\inline\vjscsvrps.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\$TEMP\pl\rule\inline\vjscsvrps.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2504
-