Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 05:56
Behavioral task
behavioral1
Sample
b69586f922d4a86f3b6c26ba4a7425e3_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
b69586f922d4a86f3b6c26ba4a7425e3_JaffaCakes118.dll
-
Size
773KB
-
MD5
b69586f922d4a86f3b6c26ba4a7425e3
-
SHA1
273bd17342cd71c3fa37f62218f44fd5c41016f1
-
SHA256
293592620f9a48242aaddfc44eb3ab0c4479a1728088edff020fa8bcaa814cb7
-
SHA512
e028af02085ce1034da5d7d617f23608f4044b8e39d3cac02d9c464883b1eb560eccc8d101129d0181e34d615464629f1d742d6454447a2a12d7461b0450e438
-
SSDEEP
12288:jeGeUpMk2lM4nsOxc6e7oho+yAS+sLpNIEGpzK6FSkFvekVpM7YYPSgwX6:gZbc6esho+yAS7tS5pzvekVoHl
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b69586f922d4a86f3b6c26ba4a7425e3_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3424 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1300 wrote to memory of 3424 1300 regsvr32.exe 91 PID 1300 wrote to memory of 3424 1300 regsvr32.exe 91 PID 1300 wrote to memory of 3424 1300 regsvr32.exe 91
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b69586f922d4a86f3b6c26ba4a7425e3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b69586f922d4a86f3b6c26ba4a7425e3_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4224 /prefetch:81⤵PID:3860