Malware Analysis Report

2024-11-15 06:14

Sample ID 240604-azqnkafa5z
Target 9328cbaf393bd868720794b6137db9a8_JaffaCakes118
SHA256 66685c4afa8d159b3f612be71271e25e07111a1e80b81831bd1ee3d03d3a9f11
Tags
spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

66685c4afa8d159b3f612be71271e25e07111a1e80b81831bd1ee3d03d3a9f11

Threat Level: Likely malicious

The file 9328cbaf393bd868720794b6137db9a8_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

spyware stealer

Downloads MZ/PE file

Reads user/profile data of web browsers

Executes dropped EXE

Loads dropped DLL

Enumerates connected drives

Suspicious use of WriteProcessMemory

Modifies registry class

Modifies system certificate store

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 00:39

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 00:39

Reported

2024-06-04 00:41

Platform

win7-20240419-en

Max time kernel

122s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 2288 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe" --crash-reporter-parent-id=2288

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=56.0.3051.31 --initial-client-data=0x10c,0x110,0x114,0x108,0x118,0x752ce360,0x752ce370,0x752ce37c

C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe" --version

Network

Country Destination Domain Proto
US 8.8.8.8:53 desktop-netinstaller-sub.osp.opera.software udp
US 8.8.8.8:53 autoupdate.geo.opera.com udp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp

Files

\Users\Admin\AppData\Local\Temp\Opera_installer_2406040039173662288.dll

MD5 d032b5dfbc2948f9501b730f64cafe12
SHA1 8e0a3e18b542e7cec52e219ab1443e64f56d7bcc
SHA256 13044ba760abf383e1197bc046a9fe7f84d36bb9c6dcdd503fcc8e0acfa427ce
SHA512 2c27fb659fa947894f9069cff15869a1cf323d663bf2fd4626eeb4b25d64ee24c8427e232f63c021c0d4a9511b82c5627fbfab0fd66b40eedf51c6b32b503482

C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

MD5 e3bafceb63c9f97dcbdaad678c051ba2
SHA1 8bf73db1f4a7d2b9eb484e2b66715a4b2c85f1dc
SHA256 828d9556bc9bc041f4190e9fc92aaa7dbe89661458e0a0f279724327b76dc5ba
SHA512 07a2a4dabdd590489805188a55107a6886f4710f1d8910358d27cb0e3f006a9cabfa0ab0574890832702a30f3ec84ded9b8033b093aaab391c6cc4b1a330d605

\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

MD5 9328cbaf393bd868720794b6137db9a8
SHA1 546f241a90b63853b18a5c0cbcafdb8828b2539f
SHA256 66685c4afa8d159b3f612be71271e25e07111a1e80b81831bd1ee3d03d3a9f11
SHA512 e9b77c5f8e480d6f1cb237cdabb9a582c6a445eebe50ebef68ea587a51f5b9b9f7aa71fd921e38425cf206d4253d8c8e601b89bbcde110533c8c7eb3a8dc8b00

C:\Users\Admin\AppData\Local\Temp\Cab1170.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Cab11EF.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar1204.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 74e9b039dafdce0cf8e45f0174a89a34
SHA1 9f3bd0d54e277e55242dae952effde8a6af8108a
SHA256 942bacc22f48044d0fa989353860534a1600390069d0112f5741492878173e7f
SHA512 95cfb76bd43a9057e1ff74b6ccb36bf5d3ee911900f9052cfa1e150454a375b6ea09a845066bc99d354bbe107aeb73feafdf8c4d138b8685336dbf6a042753f8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6f691e24b93ac439f32b7a34c21524be
SHA1 c39d75183dfc394e993fb99b64a2a4cbe44c8963
SHA256 9bd852d3ce25effe995d1bc9ccadb55d626b13cf5da231f99f5afdcc0d8c4dae
SHA512 a8699418b8f58db711332fdeb3259db5bfb364a487b86eaaa36c273e76bb9593630f098e5b8ad80acd05ff8ea04cee09193b8981bfb9b76ee50da087bde00f85

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 00:39

Reported

2024-06-04 00:41

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe"

Signatures

Downloads MZ/PE file

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4892 wrote to memory of 4376 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 4376 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 4376 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 620 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 620 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 620 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe
PID 4892 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe" --crash-reporter-parent-id=4892

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

C:\Users\Admin\AppData\Local\Temp\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=56.0.3051.31 --initial-client-data=0x284,0x298,0x29c,0x294,0x2a0,0x750fe360,0x750fe370,0x750fe37c

C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe" --version

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 autoupdate.geo.opera.com udp
US 8.8.8.8:53 desktop-netinstaller-sub.osp.opera.software udp
NL 185.26.182.124:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 8.8.8.8:53 download.opera.com udp
NL 82.145.216.23:443 download.opera.com tcp
US 8.8.8.8:53 124.182.26.185.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 121.217.145.82.in-addr.arpa udp
US 8.8.8.8:53 download5.operacdn.com udp
US 104.18.10.89:443 download5.operacdn.com tcp
US 8.8.8.8:53 23.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 89.10.18.104.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2406040039183324892.dll

MD5 d032b5dfbc2948f9501b730f64cafe12
SHA1 8e0a3e18b542e7cec52e219ab1443e64f56d7bcc
SHA256 13044ba760abf383e1197bc046a9fe7f84d36bb9c6dcdd503fcc8e0acfa427ce
SHA512 2c27fb659fa947894f9069cff15869a1cf323d663bf2fd4626eeb4b25d64ee24c8427e232f63c021c0d4a9511b82c5627fbfab0fd66b40eedf51c6b32b503482

C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

MD5 0d383e4e1fa14accdc28f579002df9e8
SHA1 a0911c1b0e2d828542e2ac78303ec496efee51bf
SHA256 521fc4df911a4c962bd72fbd3b5df559e53f4ea738542616ee2aab6f949a6deb
SHA512 7943d9eeea9b976a6e43f49e44750e42169402d69b9c1f8596e28a3c6204532568587c5188af3b9a0cd77bf07df276f16c31f19b3061c3292dce3c5777173bb6

C:\Users\Admin\AppData\Local\Temp\Opera Installer\9328cbaf393bd868720794b6137db9a8_JaffaCakes118.exe

MD5 9328cbaf393bd868720794b6137db9a8
SHA1 546f241a90b63853b18a5c0cbcafdb8828b2539f
SHA256 66685c4afa8d159b3f612be71271e25e07111a1e80b81831bd1ee3d03d3a9f11
SHA512 e9b77c5f8e480d6f1cb237cdabb9a582c6a445eebe50ebef68ea587a51f5b9b9f7aa71fd921e38425cf206d4253d8c8e601b89bbcde110533c8c7eb3a8dc8b00