Analysis
-
max time kernel
69s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
2a41b8df5b88e7e57ad356486e45ae11_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a41b8df5b88e7e57ad356486e45ae11_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$R0.dll
Resource
win10v2004-20241007-en
General
-
Target
$R0.dll
-
Size
33KB
-
MD5
ace9f19e19a07de0fe7e0f1e858a523c
-
SHA1
898c63c2f9c32d1148f8618a6f9dee89984a8f9d
-
SHA256
7e79de7c3ef68b615e86a732597a8022de71a14d81be4b4978db39a67cfc3d57
-
SHA512
a2e32fe5c3652824572f8f1a9a7b145e1c17cb6fbffa52903cffa548f450df89d996b933f95726bb514dfaa16c7d9b2ffa1caedf6ccbf6f1a577b48b0b052ebb
-
SSDEEP
384:DpbEzt/FPOksY2vb/qDl2uzCnpkDBnAeZv7/HkrWZ75fSvO3PHl/QgIZM46aeHb:DpAztlObS8rnpkCwz/AmAO3PxzC59eH
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\$R0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\MultipleSearchReplace regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\MultipleSearchReplace regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\MultipleSearchReplace\ = "{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8D123B0D-E6B3-4EA2-A47A-A526FD6D0373} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8D123B0D-E6B3-4EA2-A47A-A526FD6D0373}\ = "MultipleSearchReplaceExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7}\ = "MultipleSearchReplaceShellExt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\MultipleSearchReplace\ = "{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MultipleSearchReplaceExt.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MultipleSearchReplaceExt.DLL\AppID = "{8D123B0D-E6B3-4EA2-A47A-A526FD6D0373}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE97F5AD-DDC7-4038-B972-1F7FA072B7E7} regsvr32.exe