Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
9469a5d35d4c681014218708ee0a8fcb_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9469a5d35d4c681014218708ee0a8fcb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9469a5d35d4c681014218708ee0a8fcb_JaffaCakes118.dll
-
Size
407KB
-
MD5
9469a5d35d4c681014218708ee0a8fcb
-
SHA1
318fa73118ebed5f995ddc785a6193604d59f8a6
-
SHA256
cb510697e27dd7e30758554a4aefffce3b088ca7e92583d912808813ecfc6976
-
SHA512
a10913c1671cc1c098ea29256ae10c96dc635b9c72213cf72c18a589a9f41f103fdf35cfc402ae79861a26dbc66e3c44178034f01ec000f49b26e0b49ba968bc
-
SSDEEP
12288:1jGNfh4Fh5Xb6QNiRxsW/4V+iIDshCnf:dOa5LJNglasD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Explorer Bars\{87671123-19B0-4D3D-92C4-C086A6E5477D} regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Explorer Bars\{87671123-19B0-4D3D-92C4-C086A6E5477D}\BarSize = fd00000000000000 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{87671123-19B0-4D3D-92C4-C086A6E5477D} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Explorer Bars\{87671123-19B0-4D3D-92C4-C086A6E5477D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Explorer Bars\{87671123-19B0-4D3D-92C4-C086A6E5477D}\ regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Explorer Bars\{87671123-19B0-4D3D-92C4-C086A6E5477D}\BarSize = fd00000000000000 regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9469a5d35d4c681014218708ee0a8fcb_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\ = "Ãßõ»çÀÌÆ®" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{87671123-19B0-4D3D-92C4-C086A6E5477D}\Implemented Categories\{00021493-0000-0000-C000-000000000046}\ regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2348 2360 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9469a5d35d4c681014218708ee0a8fcb_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9469a5d35d4c681014218708ee0a8fcb_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2348
-