Overview
overview
7Static
static
3bc0c44357c...18.exe
windows7-x64
7bc0c44357c...18.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PROGRAMFI...R1.dll
windows7-x64
6$PROGRAMFI...R1.dll
windows10-2004-x64
6Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/Mozilla Firefox/$R1.dll
Resource
win7-20240705-en
General
-
Target
$PROGRAMFILES/Mozilla Firefox/$R1.dll
-
Size
1.9MB
-
MD5
c57bfc1c24b16df571bf0a90124aabf0
-
SHA1
32ab3c366bc32dc3ddc88c42eea70a4739f2e3c4
-
SHA256
8a1cc850e65e92b960f33c999fcd2452f08899a8bf94f0f51e6cf03775cb403e
-
SHA512
93e9918561235b22c5b276ba7454b8e7f3f09f35742d5766d7a81db20ff0f62e562a989eab2e32a517b12b4fb344436bfb97e2d7f6d0d950950bfd2d497edf1b
-
SSDEEP
49152:WnRVFbNJaEFnzpWNKWkjPw9JlgZSWd5EqoD4TT5X2fWMK:QRPRzUwwp0SS/XX2e
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a}\NoExplorer = "0" regsvr32.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\Count regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a}\ = "sleekseek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$PROGRAMFILES\\Mozilla Firefox\\$R1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{36a38bb6-bb5f-6c3d-465e-3f34eb90d14a}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29 PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29 PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29 PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29 PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29 PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29 PID 2072 wrote to memory of 2472 2072 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Mozilla Firefox\$R1.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Mozilla Firefox\$R1.dll"2⤵
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2472
-