Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 19:42

General

  • Target

    3bc3a65bbf1a6905afeb256146d69969_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    3bc3a65bbf1a6905afeb256146d69969

  • SHA1

    62083da37c7e5e02050e5c913aa43d61b2d42b38

  • SHA256

    15062a87c5b7c0b847a21e6e0dad5b2ec06a95cf02780056d2b175f001dfd701

  • SHA512

    923cd3b35972b220676cf494ee7f02d2af74fbe3624b38a8f6207d9c98b274bd85d204d990482c81daa138067dca0ccce41aa74a29e4e351e0f21e615cdcccbc

  • SSDEEP

    49152:WXql1PTpMhNxm+BZcb7K/dbzptGoZS1pqjSmRwLJF/:WXq/TKi/K/dSn1puOB

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bc3a65bbf1a6905afeb256146d69969_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3bc3a65bbf1a6905afeb256146d69969_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Users\Admin\AppData\Local\Temp\00294823\eohRxhj.exe
      "C:\Users\Admin\AppData\Local\Temp/00294823/eohRxhj.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2532
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\CoolCoupon\bJAwhX.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\CoolCoupon\bJAwhX.x64.dll"
          4⤵
          • Loads dropped DLL
          • Registers COM server for autorun
          • Installs/modifies Browser Helper Object
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:1364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\chrome.manifest

    Filesize

    106B

    MD5

    3e7e8d7dd8cff1a2c2604caaa0e2a938

    SHA1

    c7a0b2edb379ddc93cf4dc69ec20500253a20d73

    SHA256

    64a8fe708c1fe75af73905615defe756284f57e3283b6bc39b2d98e2a598d8f3

    SHA512

    325c41e4d7f0c82674f3ad0797a4e2ad6c476a75777bb11d648875e7ba0571bcebe1e74c2ec0f518970e47e1e2f7375159f108a0bae4bd376d8d736cf92c92b1

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    79677baeb303b3c873f3a1f922f29ae1

    SHA1

    6631312f11e8b325d739ec351dc31ec500421875

    SHA256

    944541581949a6b8e8470596c4d4b298d1f967edc05e33b801a3ae65d9df6d03

    SHA512

    2b3cfea9b22183bdfb6e89ad86ff8310b349b3368d93ef6bc20c13e922882fad8e57ebe9339a1adb2b923b275b681105e413a6fd5a5a505a17e7a8598e09eed1

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\install.rdf

    Filesize

    615B

    MD5

    9a7bd9923919f803199fac78771ef086

    SHA1

    680ef8f8a96b790770cbda72ae6f320e50dd6c2a

    SHA256

    261209a06f046388a9529ec8bd0921319b25dc471b8cc5608a56a6faccfec51f

    SHA512

    9d1109ab4217d16e9911128ee0013dc04736841ccca713aa9a5ba5ff51fde6dfaf11820a4a11f083ac691d202d1ef59c86496769ce9aafc3ecc5b6c156451425

  • C:\Users\Admin\AppData\Local\Temp\00294823\affefbdioemkciihoeikbknbnkfbmenl.crx

    Filesize

    8KB

    MD5

    3555dced9f3a868c4a8a5ad38978f9f7

    SHA1

    b2009130919c6dabb8210d4464984273257c71a2

    SHA256

    8647190f5c661c8e1f17ed60e330649524a1a2923e0bc1d4e89b91b123aff4b9

    SHA512

    33b51be8d00132f2f72bcecceb4d218b8f744ed06091c8e8911e9ce7f4cec2e36cc2b9fb0df5660fa4e209692f338f392a33e141fb65840858110f25697f8b13

  • C:\Users\Admin\AppData\Local\Temp\00294823\bJAwhX.dll

    Filesize

    416KB

    MD5

    b5e8219112f5de28e71487fd8c367b8f

    SHA1

    cc60f4497ee2328e43e89474c412d75a90be2e1b

    SHA256

    e23b94a809d4306dce3c0fb5a7dc76ad25e133cb74daa489629419ba1d849ebe

    SHA512

    d4dd2a41ab9c17125263824f3f4b5c6f3a5f8dc7c78adc298391a6a18b495a521388e2c8524c5050b7452df89d048a12b014e711fef7e4ed8b439d8959a7357d

  • C:\Users\Admin\AppData\Local\Temp\00294823\bJAwhX.tlb

    Filesize

    3KB

    MD5

    8d1f5f85eefb09e07c0f1357289b7251

    SHA1

    f9e39ac9d8e978d8fe834c527a6160eb58392e77

    SHA256

    2e46c45652d03653c407468ca871f4e910b4cec36af85853e2bd06f3fb7ad4ae

    SHA512

    df483e23bf19f90b07cf70d5e4bf7a26ece3bea39cc78b0dd652d179890000ec2c603841f5354e27676f60055094e13749ad6fc11dcf56aa8be32a8a7d916fd7

  • C:\Users\Admin\AppData\Local\Temp\00294823\bJAwhX.x64.dll

    Filesize

    463KB

    MD5

    51869d78edfbeb04d0805522d9232518

    SHA1

    4c1a736dbf800b83580265a6c6ae2ebd13e0b3cc

    SHA256

    5b9f026657796490c626a88c1b7533fc23a1ee92b4bad819f4d0940e18d0c7ae

    SHA512

    9f99165b2c27df5f43131d857340aeb197d24b00a7176943c98f9b45bd7919e4ce002f68c9c1ed03424f42a1ce94ff3968b315cf9f6d2edfba708d86fc2c03fc

  • C:\Users\Admin\AppData\Local\Temp\00294823\eohRxhj.dat

    Filesize

    3KB

    MD5

    231dd3f985d8a82c0405f544eaaa1789

    SHA1

    529e874f63651aeae5a154bf1a5e025225a16a3b

    SHA256

    656dbca69310ad368e9d6d4178822620b86b46d4fb7f8a218cb6d218f3c7f5a0

    SHA512

    85baa9ce764963888103b634bf1c4080c4ec2f0e7c6a8a22814b83daa4bca1b89cde5ef0aea340477bf08cd178d2dbfe163be1c367e5b1bc5486413edf1f92d7

  • \Users\Admin\AppData\Local\Temp\00294823\eohRxhj.exe

    Filesize

    489KB

    MD5

    a0b8b6a6967532631848d298e7947584

    SHA1

    921e36f888e2a9fbc73c381109526ce1ea874999

    SHA256

    cb90dc623c6927c7d6aae483b917e2b4aca0ed46d0d619dd7fe9fc3e9d74d90f

    SHA512

    773e03d2bc7e7ac4070d238092364060396682b94289aec1fd07dfb91c3e42bbbc0069bcf50ae29750409f22ccbcdecd13c7555a1e3346272b0838d30202287a