Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 18:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0.dll
-
Size
872KB
-
MD5
7b1501ec74fc4a75557ebd816b5dddf0
-
SHA1
c096cf0ef34a92b7de8a2e6f61fb74c9c424187c
-
SHA256
44c0f3ce768bd7657c401cd20f14519e62a755dba639077282b96339aacedb5d
-
SHA512
9443c6b35a79531548bfbe2a7335db7e87a4e8c38c9ddc0310b0c256b9a863153c62a952319126ae69b9d3b992570361fef27c59ada19d17b295a0d87007aa80
-
SSDEEP
12288:MVy/6EudYO3FBgAX1avly7e6+Z0+w2KunEhoy0n3xaqjFSyclQhuK:MYxO3XXsly7e6+Z9wwMAn3hFOlQhB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 regsvr32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 344 regsvr32.exe 344 regsvr32.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2560 2084 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner.1\CLSID\ = "{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\0\win64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner\ = "scanner Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\ProgID\ = "HPAiO_hpotiop2.scanner.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4C87-83CE-2F6835D49EFE}\Implemented Categories\{3A10D4E3-3AFF-469F-92EE-1C013F0EB992} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\VersionIndependentProgID\ = "HPAiO_hpotiop2.scanner" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\TypeLib\ = "{FFD8F33F-0763-4af3-BDFF-EB8ABE1D1553}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JAFFAC~1.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\0\win64\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner.1\ = "scanner Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner\CurVer\ = "HPAiO_hpotiop2.scanner.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\ = "scanner Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner\CLSID\ = "{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4C87-83CE-2F6835D49EFE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4C87-83CE-2F6835D49EFE}\Implemented Categories\{A2D2C384-2021-4105-B2A5-13313FEC1789} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\ = "hpotiop2 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HPAiO_hpotiop2.scanner.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4c87-83CE-2F6835D49EFE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4C87-83CE-2F6835D49EFE}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EE3CF080-C9AF-4C87-83CE-2F6835D49EFE}\Implemented Categories\{F2A5E1D0-F075-4A3B-9D2F-908B3BFE2DD2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FFD8F33F-0763-4AF3-BDFF-EB8ABE1D1553}\1.0\FLAGS\ = "0" regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 2372 wrote to memory of 344 2372 regsvr32.exe 30 PID 344 wrote to memory of 2084 344 regsvr32.exe 31 PID 344 wrote to memory of 2084 344 regsvr32.exe 31 PID 344 wrote to memory of 2084 344 regsvr32.exe 31 PID 344 wrote to memory of 2084 344 regsvr32.exe 31 PID 2084 wrote to memory of 2560 2084 regsvr32mgr.exe 32 PID 2084 wrote to memory of 2560 2084 regsvr32mgr.exe 32 PID 2084 wrote to memory of 2560 2084 regsvr32mgr.exe 32 PID 2084 wrote to memory of 2560 2084 regsvr32mgr.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156