Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.dll
-
Size
563KB
-
MD5
82c822fea9292063de5b2b576d6b88e9
-
SHA1
407433eb725e727f53aec83ff803db167fb8a64f
-
SHA256
e61546a2c8e7ccb68f98ec6251232b5147a1ecebdbe682e3a9d1474b1b627ae1
-
SHA512
4f8a058c8f2b52ba3b6cda6a4d135d5275fd1f07615dbfb49163290b6d696189498cb1767b15f27fefb92875c850872e55d3234e407abd80163fd2974673e011
-
SSDEEP
12288:E0Et9YDc/Tk4Po4wSSqodPF9C2vTgYnCqWuRD:MtWDcw4o4Ts/9CknNZR
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}\ProgID\ = "82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.sh" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}\ = "sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.sh\Clsid\ = "{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-9137-4C86-8C8F-3E4E72281E41}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.sh regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.sh\ = "sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.sh\Clsid regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31 PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31 PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31 PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31 PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31 PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31 PID 2792 wrote to memory of 2832 2792 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\82c822fea9292063de5b2b576d6b88e9_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2832
-