Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
ac581e64b2e97f9fd6f9b3576926f0c4_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
ac581e64b2e97f9fd6f9b3576926f0c4_JaffaCakes118.dll
-
Size
451KB
-
MD5
ac581e64b2e97f9fd6f9b3576926f0c4
-
SHA1
923817c9e658ea1cb0b86c9e1cb37b07958affd4
-
SHA256
32253cf7b3f32549f7fadb8b6fafac7d278e75583b658756c65e3c7d51b8c8b0
-
SHA512
8618fb632338d1957150daae003ab21ce575453b1ea3aca1152adcb8a30005957e586eab960463bfdb3b2a43d16f5305a41a05702fb67807bfe93edb8e3099b9
-
SSDEEP
12288:qA3D4CeJtEeeQFyjr12hb9oFqUYe5UGe:qA3leJtEpjmqQUYeG
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289}\NoExplorer = "1" regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{EE9F56A1-E878-DEB9-0D51-93DBF4055649} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac581e64b2e97f9fd6f9b3576926f0c4_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289}\ = "mysidesearch search enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF3E1903-AE0A-0B1B-B210-F46C7C0DC289}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac581e64b2e97f9fd6f9b3576926f0c4_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\ = "Search panel" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE9F56A1-E878-DEB9-0D51-93DBF4055649}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2864 4440 regsvr32.exe 85 PID 4440 wrote to memory of 2864 4440 regsvr32.exe 85 PID 4440 wrote to memory of 2864 4440 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ac581e64b2e97f9fd6f9b3576926f0c4_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ac581e64b2e97f9fd6f9b3576926f0c4_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2864
-