Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
eac824312154f51ea6e353e28c648815_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
eac824312154f51ea6e353e28c648815_JaffaCakes118.dll
-
Size
1.6MB
-
MD5
eac824312154f51ea6e353e28c648815
-
SHA1
14ab674127193843c9bfb27dfa00b3c002ddec63
-
SHA256
4d704d8fc743a152a13ce4fc189ec47f99b1d678f1ae19fa6951181ca9bca6b7
-
SHA512
71599c90eb1f610c46ee85cb7f31f506ca479617ef08ecb0105a677e50bd9ce06030af80d7be8c1304d222d9fb2d5352c009946855f2e7706258851512d4def4
-
SSDEEP
49152:CqYX7TAdXhCxlFBUImPbW9YyCC2TCrCteUlq:LYMXhAl/mz9PC2Tjtev
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{724d43a9-0d85-11d4-9908-00400523e39a} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{724d43a0-0d85-11d4-9908-00400523e39a} = 00 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\MenuExt regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Extensions regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B5-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B6-0D85-11D4-1999-00400523E39A}\ = "RfPasscardFields" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rfx regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.ToolBand.1\CLSID\ = "{724d43a0-0d85-11d4-9908-00400523e39a}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BAAC3901-6642-11D3-ABEE-C5DBF3571F46}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B2-0D85-11D4-1999-00400523E39A}\ = "RfIdentityFields" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B5-0D85-11D4-1999-00400523E39A}\ = "IRfPasscard" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFX-File\shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Passcards.exe\" %2 \"%1\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.FormFiller.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B3-0D85-11D4-1999-00400523E39A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B5-0D85-11D4-1999-00400523E39A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B6-0D85-11D4-1999-00400523E39A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B7-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFN-File\shell\Open\command regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\WOW6432Node\CLSID\{724d43a1-0d85-11d4-9908-00400523e39a}\Implemented Categories regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\WOW6432Node\CLSID\{724d43a1-0d85-11d4-9908-00400523e39a} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\shell\Login regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFP-File\shell\Login\command regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFB-File\shell\GoTo\command regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B1-0D85-11D4-1999-00400523E39A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}\VersionIndependentProgID\ = "RoboForm.FormFiller" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfPasscard.1\CLSID\ = "{724d43bd-0d85-11d4-1999-00400523e39a}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\ = "IFormFiller" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B7-0D85-11D4-1999-00400523E39A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B7-0D85-11D4-1999-00400523E39A}\TypeLib\ = "{BAAC3901-6642-11D3-ABEE-C5DBF3571F46}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFC-File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Identities.exe,3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFB-File\shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Passcards.exe\" %2 \"%1\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\TypeLib\ = "{BAAC3901-6642-11D3-ABEE-C5DBF3571F46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B3-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B1-0D85-11D4-1999-00400523E39A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\DefaultIcon regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.ToolBand regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfPasscard\ = "RfPasscard Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B1-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B3-0D85-11D4-1999-00400523E39A}\ = "RfIdentityField" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{724D43B7-0D85-11D4-1999-00400523E39A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFP-File\ = "PassCard File" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFB-File\shell\Open regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\shell\GoTo\command regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3AB6A2BE-5A44-11D3-ABEE-EAF45F643446}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E66C0C8E-84EE-11D3-ABEE-DD01D0A6184B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B2-0D85-11D4-1999-00400523E39A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{724d43bd-0d85-11d4-1999-00400523e39a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.BrowserHelper.1\ = "RoboForm BrowserHelper Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.FormFiller\ = "FormFiller Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfIdentity.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{724d43a1-0d85-11d4-9908-00400523e39a}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\shell\GoTo regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rfq\ = "RFQ-File" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RFQ-File\shell\Open regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{724d43bd-0d85-11d4-1999-00400523e39a}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFT-File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Identities.exe,1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RFX-File\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Passcards.exe,5" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Roboform.RfIdentity.1\ = "RfIdentity Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{724d43a0-0d85-11d4-9908-00400523e39a}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RoboForm.FormFiller.1\ = "FormFiller Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{724D43B6-0D85-11D4-1999-00400523E39A} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2492 2208 regsvr32.exe 82 PID 2208 wrote to memory of 2492 2208 regsvr32.exe 82 PID 2208 wrote to memory of 2492 2208 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\eac824312154f51ea6e353e28c648815_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2492
-