Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
88bb7cae217e7c20da9fba0811482e89_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
88bb7cae217e7c20da9fba0811482e89_JaffaCakes118.dll
-
Size
212KB
-
MD5
88bb7cae217e7c20da9fba0811482e89
-
SHA1
054fbdd4385c4191a6ac5e9c0a970238454c3d45
-
SHA256
b257d577c1c72ca96777a75efb520595d769ef10788768e6c249905a51b32fd0
-
SHA512
86ea5a32da956add08d3881145e8faf87c9b2c120f26dd34f603f602335598061923fd65aef56918580290386f78ae359a898440c21a2856c7e8e6bc0d704356
-
SSDEEP
3072:9ZVgF0hkObW7HABkCGrbwj2H72DtUKsnFJkM2hYgd0lc6Z/tHIvzdUp:rVgFWbyHAmBrkaH7gt5Pdl6ZVIvxY
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{744ED899-9428-4EDB-9658-E5E3272D7D39} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\ = "_IaqlvEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\ProgID\ = "QXK.Rhythm" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\ = "_IaqlvEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\VersionIndependentProgID\ = "QXK.Rhythm" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\ = "QXK Rhythm" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88bb7cae217e7c20da9fba0811482e89_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\TypeLib\ = "{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\TypeLib\ = "{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\TypeLib\ = "{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88bb7cae217e7c20da9fba0811482e89_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\ = "Iaqlv" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\TypeLib\ = "{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83E8B772-A8D5-4CF5-B0EF-5DF3AB80B7FA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D02E159A-9FA3-431A-B08E-E950E7ACBF24}\ = "Iaqlv" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{744ED899-9428-4EDB-9658-E5E3272D7D39}\TypeLib\ = "{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6D9B791F-34C0-4AED-B0EF-56F5CA5A6E01}\1.0\ = "aqlv TL" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 616 wrote to memory of 2116 616 regsvr32.exe 84 PID 616 wrote to memory of 2116 616 regsvr32.exe 84 PID 616 wrote to memory of 2116 616 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\88bb7cae217e7c20da9fba0811482e89_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\88bb7cae217e7c20da9fba0811482e89_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2116
-