Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll
-
Size
669KB
-
MD5
a8e2c77a0c9daf5f0b497726d57f6cd6
-
SHA1
8adf06efed9a04ebebb5ca102c0f7a6b59877a87
-
SHA256
96a7d01f77d139673b07d078e9e1915317b97b618ac376e8d5c6fc2ef59e32bc
-
SHA512
9a73b765a7483e4b82c4f02839c7afe3a98955633757cf320440b2d099fdec1193c4ea739107763911db43327048d779b24aba1ea1ed92a6e426d448fae53479
-
SSDEEP
12288:tIukUn4HHRaIsGyLmOtEAtk/1+JsHgWl9/XHYmBZu2Uogz/fO79s:trkM4nAJDL/yLHgw/XHYmBE2xgr
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-58D5-92F5-F1EF-1E8317656579} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc\Clsid\ = "{CC01FC6C-58D5-92F5-F1EF-1E8317656579}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\ProgID\ = "a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.axc\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-58D5-92F5-F1EF-1E8317656579}\ProgID regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4640 4672 regsvr32.exe 84 PID 4672 wrote to memory of 4640 4672 regsvr32.exe 84 PID 4672 wrote to memory of 4640 4672 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\a8e2c77a0c9daf5f0b497726d57f6cd6_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4640
-