Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 00:19
Behavioral task
behavioral1
Sample
0d115b9a7ee7c14715ff5967286bf046_JaffaCakes118.dll
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0d115b9a7ee7c14715ff5967286bf046_JaffaCakes118.dll
-
Size
69KB
-
MD5
0d115b9a7ee7c14715ff5967286bf046
-
SHA1
e80613bbd40c5c771a0bdb54f8d427a02c166eff
-
SHA256
1ef0597d297e82d12fbc732eaf859aec17b2b9875275a903e22dd76cb64051ac
-
SHA512
3c477a5ebebf5ffa48bea53b2f152545b1554581fe209c7833f1487a79ca37bb01984623e209405676f0272f1f9ec1f11dd838655bdcccbffe5a0f1761a82b6b
-
SSDEEP
1536:0ZDi9x/KflMUhl0pVCgJZ+CqV2+cgy4Zg+2DDZ+q1:0ZG9x8lBhqpPJHqNc6Zg+2D1+u
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\NoExplorer = "1" regsvr32.exe -
resource yara_rule behavioral1/memory/1660-0-0x0000000010000000-0x000000001002F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\ = "Iwybhotool" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\ProgID\ = "WYBHO.wybhotool.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\ = "WYBHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\TypeLib\ = "{7ED241B8-29E4-4501-BD55-A1D233A91C27}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool\CurVer\ = "WYBHO.wybhotool.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool.1\CLSID\ = "{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\ = "wybhotool Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\VersionIndependentProgID\ = "WYBHO.wybhotool" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0d115b9a7ee7c14715ff5967286bf046_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool.1\ = "wybhotool Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool\ = "wybhotool Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\TypeLib\ = "{7ED241B8-29E4-4501-BD55-A1D233A91C27}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool\CLSID\ = "{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\TypeLib\ = "{7ED241B8-29E4-4501-BD55-A1D233A91C27}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\ = "Iwybhotool" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EB680CA0-A942-4232-B9AB-5E23181AFD5B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WYBHO.wybhotool regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16FE2912-E2E2-4F3A-BAE2-D11B7A8E4753}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0d115b9a7ee7c14715ff5967286bf046_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7ED241B8-29E4-4501-BD55-A1D233A91C27}\1.0\HELPDIR regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29 PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29 PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29 PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29 PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29 PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29 PID 1456 wrote to memory of 1660 1456 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0d115b9a7ee7c14715ff5967286bf046_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0d115b9a7ee7c14715ff5967286bf046_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1660
-