Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll
-
Size
68KB
-
MD5
c072f017c271cb7540aa1a233bec9a5c
-
SHA1
5347201b0ec14088e59b896e7648d35d02934204
-
SHA256
08c7b08dce65226d83db5e1d68ef9930965a45d0fa442bf430571834c32c2246
-
SHA512
c956a731a233c6946b4f46a5d9c1bca1f8537ded74c360542157d2b08a84eba642b90676077d9c96917f4159e21a91d214d05907b1e7e0dc4cfb4824d9a78952
-
SSDEEP
1536:WnDkw0KkbVENDUNrxEAkfJ+TcTLGtvbJSF9Os:WQDVENYNNfWJ+jvbJSF9O
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00BD2861-C654-4694-A44A-98642D73247D}\ = "MyTotalSearch Search Assistant BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00BD2861-C654-4694-A44A-98642D73247D} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\ = "MyTotalSearch Search Assistant BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BD2861-C654-4694-A44A-98642D73247D} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2568 4740 regsvr32.exe 84 PID 4740 wrote to memory of 2568 4740 regsvr32.exe 84 PID 4740 wrote to memory of 2568 4740 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c072f017c271cb7540aa1a233bec9a5c_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2568
-