Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
2acddcfc003673911bf7c51e36128d35_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
2acddcfc003673911bf7c51e36128d35_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
2acddcfc003673911bf7c51e36128d35
-
SHA1
3a3562e6399617fac036a3a597fe9c5e7fe0833f
-
SHA256
f6f1eb735610fe5d1bf9d0b762a69e8d5f9cb37765c1f59e67dd3dba389d0fa9
-
SHA512
ce157672ccd0418a7e34e6124b292dee12c523ff0e21241244d48ab783cc4d7ca85d4af81e269eb97ddd7e39426d69e49f6145d58d206defcdd7860d92452ab4
-
SSDEEP
24576:ZvffBv3htYeD7seUgvCQGWoWoF4NUZ6tc29T38QHixCf4L923zdQHro4VhY:Npv39vsMC1WYF4NUZ6tlsTCHeH0f
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37}\NoExplorer = "1" regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4356 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2acddcfc003673911bf7c51e36128d35_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{668ED8BB-9DC7-41E2-B2EA-35FDE492BE37}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4356 regsvr32.exe 4356 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4356 5100 regsvr32.exe 83 PID 5100 wrote to memory of 4356 5100 regsvr32.exe 83 PID 5100 wrote to memory of 4356 5100 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2acddcfc003673911bf7c51e36128d35_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2acddcfc003673911bf7c51e36128d35_JaffaCakes118.dll2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Installs/modifies Browser Helper Object
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4356
-