Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll
-
Size
158KB
-
MD5
843350073c8419487c0b248a9cdbc39c
-
SHA1
52aba99181cd1fc190fe27239f8d4947e4786405
-
SHA256
0672d9845a8798d6b7e279cfb2bc18f8433f36f05e9b5762e378ed2bcbf9d84d
-
SHA512
3799599bfbabfa8d06e4c092853c21c64a8962bdb843f71a926701a11e70d9682e18c2ae5eeeb6cc9e9d14ed4aa6bc8d3f4b5225fc48f764e6ca50063c76ad16
-
SSDEEP
3072:MEYsWry1besW9zote9ib/ke3qauNsCwl4GjzfBQJXHT9rU5ds6G7c:GsxDggbzqMJ/jzJ8HT94w6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0C7C23EF-A848-485B-873C-0ED954731014}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0C7C23EF-A848-485B-873C-0ED954731014} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9}\ = "Tencent SearchHook" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0C7C23EF-A848-485B-873C-0ED954731014}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0C7C23EF-A848-485B-873C-0ED954731014}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909}\ = "Tencent AddrDropTarget" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0C7C23EF-A848-485B-873C-0ED954731014}\ = "Tencent Browser Helper" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 888 wrote to memory of 3616 888 regsvr32.exe 84 PID 888 wrote to memory of 3616 888 regsvr32.exe 84 PID 888 wrote to memory of 3616 888 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\843350073c8419487c0b248a9cdbc39c_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3616
-