Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 00:57

General

  • Target

    37ad38f7c434aca01c0cd3bd437fe1f4_JaffaCakes118.dll

  • Size

    56KB

  • MD5

    37ad38f7c434aca01c0cd3bd437fe1f4

  • SHA1

    a2cc67ecb7064a2492a9ff322fadb89ab3fffd3e

  • SHA256

    519f332bc025d9f58302457b694d03d6554c2cd61b57b361c8735a8e47796be9

  • SHA512

    4962760345cb0f7bf073460be71246e95ffdf6bb34dc655284c5d3a0b35c96ecf3d04d49c42e3b1be3d3dd082027991373dc9ace99eb90904e135fed579b0739

  • SSDEEP

    768:+qby8SiRvrAlHippvnSXwXOhecrCBnMsvjZUViZmD9n0C9EVy9h2gj+S3X:7S8AdippvnS37CV+Zb39X6O

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\37ad38f7c434aca01c0cd3bd437fe1f4_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\37ad38f7c434aca01c0cd3bd437fe1f4_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads