Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
b07047c0e12c790c1a17def57dc16228_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
b07047c0e12c790c1a17def57dc16228_JaffaCakes118.dll
-
Size
608KB
-
MD5
b07047c0e12c790c1a17def57dc16228
-
SHA1
7edf7143247fdf6c370f67d28129c941b7976ce3
-
SHA256
6d3134ea9631d97f0de19d7e0a13a9a4ec9393847bcc0a7b649d114c42ecc603
-
SHA512
53e7feb1676ea63a1fb0397b81954519af2cacb6d61dcf3ea2c98bfdc1873768b8b01041dc4d0a02f9cd675f786092609ded28db02d5784ea7dbd655907fd525
-
SSDEEP
12288:ApIt9HX65cspWkY5DARyLuaIg3Qaoardns2CwM0O/:AetFXsoB7LGnaoarPCwM0O
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}\ = "iwc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.iwc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.iwc\ = "iwc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.iwc\Clsid\ = "{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.iwc\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-66F3-39AA-4DB7-B24B3DB9CD98}\ProgID\ = "b07047c0e12c790c1a17def57dc16228_JaffaCakes118.iwc" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 952 wrote to memory of 4224 952 regsvr32.exe 83 PID 952 wrote to memory of 4224 952 regsvr32.exe 83 PID 952 wrote to memory of 4224 952 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b07047c0e12c790c1a17def57dc16228_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4224
-