Analysis
-
max time kernel
134s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.dll
-
Size
610KB
-
MD5
badce9df7f604b60f997570f6bbcea5b
-
SHA1
78455d36526f638e2a974f5515cfa6517386a748
-
SHA256
ab0050fd91cc25b35cfd840615845eadabd83bce490d463c652ed645ab740bde
-
SHA512
7eb690b58a565730b7ba434c79268f70597e91f1b871835a85f5d3565f0732a04c1618bac2aa06261f0729b2affc3743937dfd88b0a5e57e9a4ed479c6ba6f1c
-
SSDEEP
12288:5yA1ZdqVfv/6HftOIA3+00wstpSdCi3TLdLOGUFQBfWVBwBYHeIBv7pj:p1fqZCHwIr00taCiHpA2tWUUeIBT
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-7328-4568-17AF-6156FB545ABC} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC}\ = "sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.sb\ = "sb" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.sb\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.sb regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.sb\Clsid\ = "{CC01FC6C-7328-4568-17AF-6156FB545ABC}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7328-4568-17AF-6156FB545ABC}\ProgID\ = "badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.sb" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1212 wrote to memory of 3148 1212 regsvr32.exe 84 PID 1212 wrote to memory of 3148 1212 regsvr32.exe 84 PID 1212 wrote to memory of 3148 1212 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\badce9df7f604b60f997570f6bbcea5b_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3148
-