Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll
-
Size
68KB
-
MD5
c072f017c271cb7540aa1a233bec9a5c
-
SHA1
5347201b0ec14088e59b896e7648d35d02934204
-
SHA256
08c7b08dce65226d83db5e1d68ef9930965a45d0fa442bf430571834c32c2246
-
SHA512
c956a731a233c6946b4f46a5d9c1bca1f8537ded74c360542157d2b08a84eba642b90676077d9c96917f4159e21a91d214d05907b1e7e0dc4cfb4824d9a78952
-
SSDEEP
1536:WnDkw0KkbVENDUNrxEAkfJ+TcTLGtvbJSF9Os:WQDVENYNNfWJ+jvbJSF9O
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00BD2861-C654-4694-A44A-98642D73247D}\ = "MyTotalSearch Search Assistant BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00BD2861-C654-4694-A44A-98642D73247D} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\ = "MyTotalSearch Search Assistant BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29 PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29 PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29 PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29 PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29 PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29 PID 2532 wrote to memory of 1232 2532 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1232
-