Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
ff2586683a26e994af935d4af9c8a755_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ff2586683a26e994af935d4af9c8a755_JaffaCakes118.dll
-
Size
5.4MB
-
MD5
ff2586683a26e994af935d4af9c8a755
-
SHA1
9e47dc9d1e3c993887282702126c8936dfa59f78
-
SHA256
5b5f798779023d7c751fd5339720c2ae9578b081775b1a1110423537f3e0d598
-
SHA512
177ab8c81934b5cc5644cb2671acee562a59a644e0e5f07d67147bb5618ec72a617b81957541f7974f0dabcce85c37acc7d3e54aa46d25fe20bc0410d0dd5a2f
-
SSDEEP
49152:sCjVgO9riKQHyBTd/L5fn1666LHHHO666VhhhVJJJ:nOOsk/l1666LHHHO666Vhhh
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6}\ = "DXImageTransform.Microsoft.CrSpiral.1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ff2586683a26e994af935d4af9c8a755_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6F3F61E-A8E6-400C-B813-C1767C68F1B6}\InprocServer32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5560 wrote to memory of 4604 5560 regsvr32.exe 89 PID 5560 wrote to memory of 4604 5560 regsvr32.exe 89 PID 5560 wrote to memory of 4604 5560 regsvr32.exe 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ff2586683a26e994af935d4af9c8a755_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:5560 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ff2586683a26e994af935d4af9c8a755_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3880,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:81⤵PID:5164