Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 00:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2801d1eb6b234b0241b7166ab4cf1582_JaffaCakes118.dll
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
2801d1eb6b234b0241b7166ab4cf1582_JaffaCakes118.dll
-
Size
160KB
-
MD5
2801d1eb6b234b0241b7166ab4cf1582
-
SHA1
3e72859408c58d09d2c37e5a0a57b8bcd04475ca
-
SHA256
cf1714a1f73ae0220d6257135a37d7ec787d45fd3fe4534533ee6e49f49b1260
-
SHA512
e1e332c3519e297594a1da5a1b509b135e3d6870e0c45e5aee946015aace618389d89d0fcfa51dcd362d1c6e1a2f1576b1d58efccfca594510e3002f4e151f8f
-
SSDEEP
3072:yMNvohp/ijKn/hm63pTLwNonOmojbKovc:yMG/i+n/hmVmO/N
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0} regsvr32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system.ini regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\TypeLib\ = "{296AB1B8-FB22-4D17-8834" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{296AB1B8-FB22-4D17-8834-064E2BA0A6F0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2801d1eb6b234b0241b7166ab4cf1582_JaffaCakes118.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4816 4468 regsvr32.exe 83 PID 4468 wrote to memory of 4816 4468 regsvr32.exe 83 PID 4468 wrote to memory of 4816 4468 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2801d1eb6b234b0241b7166ab4cf1582_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2801d1eb6b234b0241b7166ab4cf1582_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4816
-