Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
df1331552ab8d667dcf19c3b3236180d_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
df1331552ab8d667dcf19c3b3236180d_JaffaCakes118.dll
-
Size
36KB
-
MD5
df1331552ab8d667dcf19c3b3236180d
-
SHA1
b72b1811f1bffa8878e7654fcbad186b192e8e5f
-
SHA256
e85163891c6a42ff2fa03c21484ad4586aca20936ad05870a810870ec7336fa2
-
SHA512
986efc50e041aa1f1413edde7d43a94ba112037536519978be2c738cb517142285c9de9c56b11641fa67b03bde47b23b39c19832d5bf42ac7198f1b397d943b8
-
SSDEEP
768:gYus7aqsG98dIeqZEjkKqI4H+vZXd9BlVaaHPuIk/:gHsHvfGk44HQRbhaa2Iu
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18F5DA50-4BBB-4C2E-B923-4CFCE076F7A6}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18F5DA50-4BBB-4C2E-B923-4CFCE076F7A6} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18F5DA50-4BBB-4C2E-B923-4CFCE076F7A6}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18F5DA50-4BBB-4C2E-B923-4CFCE076F7A6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18F5DA50-4BBB-4C2E-B923-4CFCE076F7A6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df1331552ab8d667dcf19c3b3236180d_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30 PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30 PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30 PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30 PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30 PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30 PID 2980 wrote to memory of 3016 2980 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\df1331552ab8d667dcf19c3b3236180d_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\df1331552ab8d667dcf19c3b3236180d_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3016
-