Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
2af2ea589651f296d23734456290c21f_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
2af2ea589651f296d23734456290c21f_JaffaCakes118.dll
-
Size
609KB
-
MD5
2af2ea589651f296d23734456290c21f
-
SHA1
f4cc6ae0bc669d843bddf401d38d926fc1d61790
-
SHA256
67afc6277fe6565039d2a1865c475d0b72e3a56aa906d5fe865931a1ebcd1c90
-
SHA512
ee8161ce35407d9a7dc287dad8d7c40d1818a5d93727c3d3b6b7b99b6750559004276bff71bf932697902e72e4ed867c113d9d409c5584794c9d235eedede38f
-
SSDEEP
12288:oAFp96Ffv/aX/tOo0O00w8NJidSCnTLtb7x9U4RR3VBwkHeIBv7pj:dFv6piXQob009qSCXp7Ui3DeIBT
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-E238-91FB-981C-439A4F88EB84} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2af2ea589651f296d23734456290c21f_JaffaCakes118.sb regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2af2ea589651f296d23734456290c21f_JaffaCakes118.sb\ = "sb" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\2af2ea589651f296d23734456290c21f_JaffaCakes118.sb\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\2af2ea589651f296d23734456290c21f_JaffaCakes118.sb\Clsid\ = "{CC01FC6C-E238-91FB-981C-439A4F88EB84}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84}\ProgID\ = "2af2ea589651f296d23734456290c21f_JaffaCakes118.sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84}\ = "sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2af2ea589651f296d23734456290c21f_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-E238-91FB-981C-439A4F88EB84}\ProgID regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30 PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30 PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30 PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30 PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30 PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30 PID 2796 wrote to memory of 2684 2796 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2af2ea589651f296d23734456290c21f_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2af2ea589651f296d23734456290c21f_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2684
-