Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 15:00

General

  • Target

    2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.exe

  • Size

    12.2MB

  • MD5

    2561fe0b8dc127e519060d27c8d1bab9

  • SHA1

    e9a7274a80bf54500548db2fd5101fe7e734df71

  • SHA256

    2d5c9e027ee3da44d9b6d7f2207d516c59e914ea393bdbb7eb75b3d2faad37e7

  • SHA512

    a59093f74cc5eef4835f8ca2a852622f7b35296f3997c68a4ff17b25fd0afb0c395eed9afc0755d13947ec2c22c95db265529b30c334d3137037d5bd7ddd0695

  • SSDEEP

    196608:UwoanC5eKj8FATCoLl/FzPGCv36B81IJyH4RALa9rgZZoTDBjerFO2x9hQeyu:sanC5AMt9GM3F1uyeAGpgZZ2CpTDhQg

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\is-9MP05.tmp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9MP05.tmp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.tmp" /SL5="$400F4,12366293,146944,C:\Users\Admin\AppData\Local\Temp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\reader.exe
        "C:\Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\reader.exe" "C:\Users\Admin\AppData\Local\Temp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.exe" "(x32)HKEY_LOCAL_MACHINE\Software\\TweakBit\\Driver Updater\\2.x\\Settings"
        3⤵
        • Executes dropped EXE
        PID:1816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar211F.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\enu.lng

    Filesize

    227KB

    MD5

    5401e0dad5d356b1fed2415ee22a051f

    SHA1

    0eabc3d33501e285f99dcce2ae80225ca5e0632d

    SHA256

    af0cca4584b240ad3b04c20bc4fd696e5c4c2f5d7bfc8df183804da4e0b6fb2c

    SHA512

    a5a8951eb27932da5334e4249d412bcb74800e3acaeb10cb344f5157254dc65a66553009482a6252ecbf032cfcbd6a622c9684e2bd11c60d58a20c8c2351de00

  • C:\Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\reader.exe

    Filesize

    502KB

    MD5

    458d626c371b0c9a3df77340fec128dc

    SHA1

    b481f7fdf4ea7a0fafdca1dd622bd965fc1d7c87

    SHA256

    731d5634c4e31f124e40e8f4d65636a0351d386729571624838fa91d9c061ff1

    SHA512

    50fd7a396b124abaa3921c9ce8177cc2e16eed3ad35edf0f0efd45493ebd3d8869fee7a63a7487dc5f98118e981852746c2c8b03ae2c5b8d5f163dbdef758c72

  • \Users\Admin\AppData\Local\Temp\is-9MP05.tmp\2561fe0b8dc127e519060d27c8d1bab9_JaffaCakes118.tmp

    Filesize

    1.2MB

    MD5

    be52f3f8e2cfd801e4e8bdbd0bffa065

    SHA1

    7bf6483be554986b92581d4e693bbad22318c39f

    SHA256

    dfe9dfe0cc98c797e0340bee073c3d785ddd0ad78ed6fc24809cfa339c156d1b

    SHA512

    2f3d313dd6f9d8f8bf526b54f3031f27609f4f8d548d7ea6e9950d9bc2f76c6dc53af75986f0db0123b936ccb874fda7a36b417d4ad60c4f6de587573ca422e0

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\AxComponentsRTL.bpl

    Filesize

    1.8MB

    MD5

    e000d3f93a6b1db3e056417152434313

    SHA1

    773a16ac587ed2245be4a61eab3608a59391219e

    SHA256

    c22fad88d23c08db4ed7008a074205b88e624c6d02bbb96ac87a28ea53f3741e

    SHA512

    def584d6d2bc7d3f9ec48f07d8f31046019b0998d5a390a82ff85aa5fb1daa1f672c8259ea4c33981c09e8bdb1883d34c5ea8aaf9f7bf77b3a6b05cb274e02f5

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\AxComponentsVCL.bpl

    Filesize

    6.3MB

    MD5

    5fc46e0319e3cbed209551ecfaa9e9a6

    SHA1

    68d2f9d1b768fbc629df9a3f8d7485455143f4d1

    SHA256

    f4152ca2a44fab5a1f23967d7da143a2ecf5d86f5a0502afed452adb38a53c9b

    SHA512

    964cb9d43a7ef854f9a241acc8c5439465e81179efbde20b2c214e845ccb4203ae2117c9d5cf57ab780f9ea637185a5574bd7ad4c4e53f464c0de3483e3b31a4

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\BrowserHelper.dll

    Filesize

    1.5MB

    MD5

    14ddfd9b9edae7146a2d82f961cc6790

    SHA1

    e4c011e6334436f541c7d55f4a311259400ffef7

    SHA256

    6039cedce7d05f2559b27e6d8d68c97a8485a59b17822e4fc0ffda932a946fc0

    SHA512

    4218a6ac38c9f9a9c38e8ffa0a9cecd73cb8212dcb33fdf23c1c7e7ba86adba4c69eede83798878c9e2013f2a7e2fb6151fa89c4be5ad4d94a467457c1de2ed4

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\CFAHelper.dll

    Filesize

    89KB

    MD5

    60379761a033e0630788ea4d47138185

    SHA1

    fba480d77b30c7293bf42da38567c03a561d76ce

    SHA256

    b3900fc358adbb46ea4aef74b5d4dd46cee4d82927fea8607019ac375f0e8d20

    SHA512

    a110b48209903dbc3197d1bd43d721d9fc0e6ab515c9b3f1f40e85b0fd55483d9de7ddaf4254c207f1879a53a9427506c5a25b5c6109edf15ebeebfb0dd839ab

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\CommonForms.Site.dll

    Filesize

    294KB

    MD5

    765f93cba8e5831e2ee24f158d65763b

    SHA1

    4cfdafebb8c027b51a896a3eb3aecbc4d008487b

    SHA256

    7e9d4f8be7971cd9716884617e4dea01ecbdcd9bfcdb960dd623732d02168dd6

    SHA512

    309e672d5296a51a0b7763dedcec16e2b4feebc051351949b98f2e7386b82bcca6992f7449613a9f0a7dd3de26c03857f640fc1b5551b3d0cc111d623e03d31b

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\DriverUpdater.exe

    Filesize

    4.6MB

    MD5

    993646ff88f0668280c6000430969168

    SHA1

    b5a6cfb816fd3235b2055e79d15c669788f1427c

    SHA256

    a812c257d1a022d2838c2ed550baa9b40c4293f59e8ef302bfb12864d596b0c2

    SHA512

    979fb298653250923cbbb294aa532e26f28986be090364c3e456cf9c0edce272c8c93b6db0c3b6740a0000fcbc7643ee36b944fb8f2120de861912f6ddefa5b5

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\GoogleAnalyticsHelper.dll

    Filesize

    116KB

    MD5

    b570b78534eb869ccbb30669203dd66b

    SHA1

    15103864a1d8ae384098433a779d5297f630cd53

    SHA256

    f75901e74681d0f849367e9cbd852e9b3f7b50f6e6464b957003f3e5bb3f22b0

    SHA512

    443f73235989700b8040486e3cf3031935ccbea143e486b83b9b9adcc5b2b29a774e2030a760737d0a195cfed1c5aa3fe1211b2df16f987fd95f9c6bd290cc15

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\Localizer.dll

    Filesize

    190KB

    MD5

    7be5043e4d48c69944c2d91a885a8a8b

    SHA1

    7367b8acae6927e93a550ede899a670165c04e0f

    SHA256

    fdf4e106f376a9a7ad83cc7cb0555a8be85aea4b83548c008837a8610662eccb

    SHA512

    6f4eee91c31c631ce3ce712efa7b2cf3740d67ebb5330dad3db03b64f07714b89525212850ee5f712e13a2accc8abee02a8ae48500fe1001d079039c2750bc1e

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\WizardHelper.dll

    Filesize

    1.5MB

    MD5

    68e66515662fa3b706edcd0e1c5ac701

    SHA1

    cbc9bec77afd5224f1fbbab5b5b994746ecb8145

    SHA256

    07baaa9e058349c243caff2d04786bca9ae223b480f7e050f04c649ebe44c3e2

    SHA512

    a1bfcd28a42ba2ff9b9d67d4ae1eaf121273396e7c570c6dab0b63fee53d886f80c1f8dba903073f2aabfc6fea27bb6c2b8b54cac8522bd918b16b5f8503cb96

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\rtl250.bpl

    Filesize

    10.1MB

    MD5

    ae3b3b80021495c01da4cd6f22682f77

    SHA1

    3e2be3a54756752b6c40baefd0a6f1f0a51d8190

    SHA256

    eb36a1b1998f27cb1e64c02c49e88b621a3f0b44484c09fa7e84eb5588cd38c9

    SHA512

    f2ffb60c059dd16ffa82ba58cbff901a4670560bcb562b0e95a6dcb6f82fd326c63742ae98c7b47f6f10adaa8532e9157c23da9368544d05b7e99b9ed56aed97

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\sqlite3.dll

    Filesize

    836KB

    MD5

    4caf2a8ed45c12150c1ace254bff608f

    SHA1

    b9a43065bf45c2fd53617b626a9052876907f73d

    SHA256

    0e66c25c60d282f346cf538fb2ee69bb75e5164090419e349af7aead1d4c35db

    SHA512

    3ea2d1431be81dc8c50e8b31dcdf9e0d89637e92b403cc04137f6cb30559afbd842cc4046f5aa35d33294c175b8d2a1c33c5898085cea65e2c2860fd09d04a7c

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\vcl250.bpl

    Filesize

    3.9MB

    MD5

    6a897f43aedcc8760aaba6e93714f1e2

    SHA1

    62f037e9ba0291b563f90cd1eadd6ce174847e81

    SHA256

    94dba2ae097bf73edc06cb3084805b6f83e9348d1a1e9bce8ab17f14f976279d

    SHA512

    f0121bf83236b7de1cfd7a99031e74b1dea2cbd2eb76d86fbcb02251021c989548615da411abba36796ee36d3b254eaa65249b3f77efdb48a16b224a63f03027

  • \Users\Admin\AppData\Local\Temp\is-AS7BC.tmp\vclimg250.bpl

    Filesize

    357KB

    MD5

    ce19a7d9ef38d037e4084df12ac82062

    SHA1

    dce889e114508055b34cda588c2199f6da23eb14

    SHA256

    4593c64c8a4be0ce80107c21ce5d637ace8fe646b2cfc347940c760adee162dc

    SHA512

    2c31714e3e0514ad445a13289c5bc928e12ea3fc8f74d26ffcfb26cc17bf45575e5cc74ba21f3bf4cac52cceabc72cd004aaf46ac9d9f1dd984453d1aa134cdd

  • memory/2092-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2092-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2804-38-0x00000000072A0000-0x0000000007CC6000-memory.dmp

    Filesize

    10.1MB

  • memory/2804-78-0x000000000A420000-0x000000000A438000-memory.dmp

    Filesize

    96KB

  • memory/2804-77-0x000000000A420000-0x000000000A438000-memory.dmp

    Filesize

    96KB

  • memory/2804-75-0x000000000A3D0000-0x000000000A41E000-memory.dmp

    Filesize

    312KB

  • memory/2804-68-0x000000000A290000-0x000000000A2C5000-memory.dmp

    Filesize

    212KB

  • memory/2804-57-0x000000000A270000-0x000000000A288000-memory.dmp

    Filesize

    96KB

  • memory/2804-58-0x000000000A270000-0x000000000A288000-memory.dmp

    Filesize

    96KB

  • memory/2804-50-0x0000000008290000-0x00000000088E1000-memory.dmp

    Filesize

    6.3MB

  • memory/2804-53-0x0000000007D90000-0x0000000007DEA000-memory.dmp

    Filesize

    360KB

  • memory/2804-155-0x000000000B210000-0x000000000B220000-memory.dmp

    Filesize

    64KB

  • memory/2804-149-0x000000000B140000-0x000000000B150000-memory.dmp

    Filesize

    64KB

  • memory/2804-47-0x0000000008100000-0x000000000828C000-memory.dmp

    Filesize

    1.5MB

  • memory/2804-33-0x0000000000690000-0x00000000006B2000-memory.dmp

    Filesize

    136KB

  • memory/2804-8-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/2804-370-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB