Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 21:44
Behavioral task
behavioral1
Sample
d523ad032eb18c5a0b24da8ce266910a_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d523ad032eb18c5a0b24da8ce266910a_JaffaCakes118.dll
-
Size
180KB
-
MD5
d523ad032eb18c5a0b24da8ce266910a
-
SHA1
cf1de969cebd917cd5bc096d5749338b0645231e
-
SHA256
d499848f9afdc721e9013278d0278ed1944e441f5d97a4b855fc9ac96f72d537
-
SHA512
d9b8d8db8770cfe9f5b52fccea6492c49a9a9d0abc8ab3532a01a080d00ab35f9050d9d56673d83afc2c5c75c77a296a5652235d7536ce3c7b8e3a7439e5a592
-
SSDEEP
3072:eKrwLcm9FqGOjbl5ZZTCSANKxibbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVA:Brw7epbIjwvP6bQ7yMP+DE827yrZ8/
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D103EBF9-6DD5-4715-863A-00AA27C7935A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D103EBF9-6DD5-4715-863A-00AA27C7935A}\ = "loader" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\loader.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\loader.DLL\AppID = "{D103EBF9-6DD5-4715-863A-00AA27C7935A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d523ad032eb18c5a0b24da8ce266910a_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\ = "loader 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31 PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31 PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31 PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31 PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31 PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31 PID 2076 wrote to memory of 2472 2076 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d523ad032eb18c5a0b24da8ce266910a_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d523ad032eb18c5a0b24da8ce266910a_JaffaCakes118.dll2⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2472
-