Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
dad8f8982bf39faced66ad43f7cbad8d_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
dad8f8982bf39faced66ad43f7cbad8d_JaffaCakes118.dll
-
Size
2.3MB
-
MD5
dad8f8982bf39faced66ad43f7cbad8d
-
SHA1
56d445238f7754ea828146020c7554c2e425a159
-
SHA256
9c4fc62caba70e732f4d1265aec5173d4a3155fe28deb87c2436dcd195fa0dd0
-
SHA512
720e7bc019dd198815c79b7323be1b360a5afd55cb0b533d7195fe0ecf64f34ebfbb1b7a277abc1d3079514e0953bb5d15e131a50db90d8602c8b472e3ff260a
-
SSDEEP
49152:PFJHxOdrDMpGhpNyGLUx/WINM0GlgkX4yB9TesoGa:ddxOdUp4Py2UxtHGlnoyBR
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C2B5AAB8-2183-4be7-81A6-F11493C45872}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C2B5AAB8-2183-4be7-81A6-F11493C45872} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C2B5AAB8-2183-4be7-81A6-F11493C45872}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C2B5AAB8-2183-4be7-81A6-F11493C45872}\InProcServer32\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C2B5AAB8-2183-4be7-81A6-F11493C45872}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C2B5AAB8-2183-4be7-81A6-F11493C45872} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C2B5AAB8-2183-4be7-81A6-F11493C45872}\ = "Antivirus Plus BHO" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30 PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30 PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30 PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30 PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30 PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30 PID 2108 wrote to memory of 3000 2108 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dad8f8982bf39faced66ad43f7cbad8d_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dad8f8982bf39faced66ad43f7cbad8d_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3000
-