Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
eac824312154f51ea6e353e28c648815_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
eac824312154f51ea6e353e28c648815_JaffaCakes118.dll
-
Size
1.6MB
-
MD5
eac824312154f51ea6e353e28c648815
-
SHA1
14ab674127193843c9bfb27dfa00b3c002ddec63
-
SHA256
4d704d8fc743a152a13ce4fc189ec47f99b1d678f1ae19fa6951181ca9bca6b7
-
SHA512
71599c90eb1f610c46ee85cb7f31f506ca479617ef08ecb0105a677e50bd9ce06030af80d7be8c1304d222d9fb2d5352c009946855f2e7706258851512d4def4
-
SSDEEP
49152:CqYX7TAdXhCxlFBUImPbW9YyCC2TCrCteUlq:LYMXhAl/mz9PC2Tjtev
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{724d43a9-0d85-11d4-9908-00400523e39a} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar\{724d43a0-0d85-11d4-9908-00400523e39a} = 00 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MenuExt regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Extensions regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\CLSID\{724d43a1-0d85-11d4-9908-00400523e39a} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rfn\ = "RFN-File" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFC-File\shell\Open\command regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\shell\GoTo\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Passcards.exe\" -t \"%1\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfIdentity regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfPasscard regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43be-0d85-11d4-1999-00400523e39a}\VersionIndependentProgID\ = "Roboform.RfToolbox" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43a1-0d85-11d4-9908-00400523e39a}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B3-0D85-11D4-1999-00400523E39A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B6-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFC-File\shell regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rfx regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43a9-0d85-11d4-9908-00400523e39a}\VersionIndependentProgID\ = "RoboForm.BrowserHelper" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.ToolBand\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.FormFiller regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43bc-0d85-11d4-1999-00400523e39a}\VersionIndependentProgID\ = "Roboform.RfIdentity" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B7-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B7-0D85-11D4-1999-00400523E39A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B8-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rft\ = "RFT-File" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43a0-0d85-11d4-9908-00400523e39a}\ProgID\ = "RoboForm.ToolBand.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.FormFiller\CLSID\ = "{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43be-0d85-11d4-1999-00400523e39a}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B6-0D85-11D4-1999-00400523E39A}\ = "RfPasscardFields" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\shell\Login\command regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.FormFiller.1\CLSID\ = "{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B3-0D85-11D4-1999-00400523E39A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B5-0D85-11D4-1999-00400523E39A}\TypeLib\ = "{BAAC3901-6642-11D3-ABEE-C5DBF3571F46}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B7-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFP-File\shell\GoTo\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Passcards.exe\" -t \"%1\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFX-File\shell\Open regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43bd-0d85-11d4-1999-00400523e39a}\ProgID\ = "Roboform.RfPasscard.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B1-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFP-File\shell\ = "Open" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rfx\ = "RFX-File" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.ToolBand.1\CLSID\ = "{724d43a0-0d85-11d4-9908-00400523e39a}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfToolbox.1\CLSID\ = "{724d43be-0d85-11d4-1999-00400523e39a}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43bd-0d85-11d4-1999-00400523e39a}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43bd-0d85-11d4-1999-00400523e39a}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\ = "IFormFiller" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B1-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B6-0D85-11D4-1999-00400523E39A}\TypeLib\ = "{BAAC3901-6642-11D3-ABEE-C5DBF3571F46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B8-0D85-11D4-1999-00400523E39A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFN-File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Safenotes.exe,1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rfc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFC-File\shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Identities.exe\" \"%1\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43a9-0d85-11d4-9908-00400523e39a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfIdentity.1\CLSID\ = "{724d43bc-0d85-11d4-1999-00400523e39a}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43be-0d85-11d4-1999-00400523e39a}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{724d43be-0d85-11d4-1999-00400523e39a}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{724D43B5-0D85-11D4-1999-00400523E39A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFB-File\DefaultIcon regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFB-File\shell\GoTo\command regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFX-File\shell regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfToolbox\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\TypeLib regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30 PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30 PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30 PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30 PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30 PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30 PID 2240 wrote to memory of 1948 2240 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:1948
-