Analysis

  • max time kernel
    133s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 09:48

General

  • Target

    158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe

  • Size

    315KB

  • MD5

    158cddd057501f7d7aa00f31ae55f116

  • SHA1

    9339ce1da196c1e987269af62b6e703b7397507f

  • SHA256

    7b8bc4b57561b24c769dede794f0ac0d05bfee4479663a25b2fa3890ae16a82d

  • SHA512

    7dbbfb4ac0dba85cf9a4320fac47375be60e02e3b3604c893984d4552930489e058f6662991d0d0576e4cbe0bffc235980d86336f2496b0cd2cb6583f29fae50

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sIDAvTpPmYFdZWD2YojZBzKiKD:91OgLda+vrWCrWiKD

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\158cddd057501f7d7aa00f31ae55f116_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:3188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Codecv\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    bfaf3acd73f7fc56db6dcd55f781b8a6

    SHA1

    8c7a1ade0c3236389fb87e99d8b618955cf0f217

    SHA256

    1312eabf9ac739001aec825b59fc7ba0c5e89edfef40a7318685389f88787bab

    SHA512

    a819cd5582e51d6d49b479c0a3b34534d2f76019d982ae553b87c2c502ef1a7995ae192128e695a6ffeac051a078dbda5a8b6dba047656da1a85763bb7ac327c

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    f3ac1ae71467d5f970cc6a9697a9078a

    SHA1

    4de2a9f2d5bac1da3a1374f657877e7afc5399b4

    SHA256

    812d2aa9a3090ffc049567f4cc0852fdfc476ddb6fff0833d59d4b6c59810e2e

    SHA512

    e9cdb0504f621a38e99dc812a574df6a7ca0fa244ed0ab97639c12ecbdb01988ddd3dfbfd2038c952b4a6597956d3956bdb6b70ebdf48c6d7e3dee077a65f247

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    6c9e7221d41c96d425ee200c78687d46

    SHA1

    d441753db8048b1146291ec124d688ca6da75a25

    SHA256

    3324c5f8a13d0909d6ca2c24fd7fb488b7925a7b4b2cabf6637181f17507dd95

    SHA512

    bce12daa1f254052a0b03bcdfaa301b4af99ebcea93bad05bcfaf265626a0ec0f6f265550acf5521059f07bfe29f6ad64622605dae1e4abedc26900f4aef0022

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    546b8385417d40cc6332c5ebfc7c0cba

    SHA1

    4791a86842e669fedcd5ed2c99e4ec280f36ea80

    SHA256

    924aa4d7cefaf90da5ccb5944bc8c33c722e54116582dc5e6d00d72d3001d196

    SHA512

    842577aedab39b3ef7cecbf45c94c41a56b0f0ff640ca42f09061935336fc3a56da9926586efb7f410c35cccac937bd72a0604693694736a631b77ea4b1b3b84

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    d57c8ba1e4d5fbe4644424c28d3a4cf4

    SHA1

    9d1000bd91962f8f22ef270e88f61c332cf511f8

    SHA256

    25906f4821b96a4e237ab5c12549b978cbf1d5ea582053b371b1adb6f30fdda7

    SHA512

    b9be762ed6ce10ba777274e04a640eb044acea26a5f1bb6afc272813cae095c0a343adbf25afe14929b063f13044ff1cb56b99a059aa31519ea0ce7f32e60ebb

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    4bead26384fedac60290d74baa90dfda

    SHA1

    935b573aaeca1b52a3b6142808dd2b25aad0cd81

    SHA256

    ef5d67ef98f0b450ae55fae8677983d0a84810944a0db43cd30c3f7edbe6a5fb

    SHA512

    088f526ec78d6dea99b0bf08c31e07a3eba88722eba405bdf0ddc8e0be6ef4f7eca66dae131e22cdf329618aebe2b81e112b8b2eb55e047b044212be6d09c61a

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    c0a952540591b64d9489ad78872307b2

    SHA1

    887a404f503ed979d2080ec50c0adde6e0d1d41f

    SHA256

    57d6d04c93d2a8ab403ff989eca0ff7fc3a82c65f80f3ef0ca6280b1688a9fef

    SHA512

    d147b7f3b91c4e9fc92b4636f0b57449303bc8ea61a38f235bf33e8a5248993ac7f68e36801c277ab8d218d89faa19f50041783ace48bbd9abd17150b08bb9c6

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\[email protected]\install.rdf

    Filesize

    676B

    MD5

    cd296c1c2d965a7b8d3e380f23872321

    SHA1

    bb4d238a8ff8522879d4309c33910c4365d3f109

    SHA256

    180b14c82cb111c4a6b84b4e4859e8d81affb2ea88dc7771c8557f7ddfe3fbbc

    SHA512

    49af58cd13a705278e86086f1583400b3f6e89a288391b04185287016c75c93d08174c180cc96f6376122ab0232cd05919321d09b1728431b09c658ac9eb555f

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\background.html

    Filesize

    5KB

    MD5

    b6597c00bd57419d4f8ca4890fba50aa

    SHA1

    65049137ded8235651b73c649a77c97e151b4962

    SHA256

    cafbad880729282e08708b7ead438acf976f061fddd7b7a8b5f85841f797f974

    SHA512

    8c0c9d708cd294055bb10d6544daa0ad23fb53cd1efa54d7cb6d1017f0f9e6b9d931ae30823729ba859d577ca54374e5f13b5e0f30c6371c4ac9ea107a3e1802

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\ckimcnmhjdjgcdddbnfmdoabbhbabpek.crx

    Filesize

    37KB

    MD5

    8ef3035d23d9453439f1313c66b3e8c0

    SHA1

    66b6d99253a234769ae355f4018ca383985f21b9

    SHA256

    c22b41676c87b30845d43e854f52d7e40f8d07983b8ee83c219651a325b274cd

    SHA512

    8525018c14b554b703fd704ddb26f617090e3b2b8aab5bf4b84e13dd626a386d5dc8eb61bf6a201b23e8d60b4b1c9fae830c5e8084f6bc6fc14f11b57fdbcab9

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\content.js

    Filesize

    734B

    MD5

    b1967331e10316faf847727971da30f1

    SHA1

    efa452122a382ed5cacbf090f967f20ce89429e2

    SHA256

    b69942f6ef5f000fb282869f559c9cfb42a7374a91a0924b2ac8cf9a0c3c9190

    SHA512

    7e202c2bcd6a2e4c618f8137bd86e2cc72f99e3b6b0188e100ec592db4c1f9ee1264d6dd4667a0abfa0b7a5bfc2e65373c8574bb39572db4fa53df3bac9740e2

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\settings.ini

    Filesize

    660B

    MD5

    9987e08e3d4a9d8dbbbc3654c6e851af

    SHA1

    2cf19c1a9b7ae2d808b01a012aa544fee8e765a7

    SHA256

    f0f8a1928f74f621033d4d2d54b3836ceac823cb4f1cdbb96cad5f89a004e812

    SHA512

    c49c18f16327ae24f04730ffebd0c314b5915d0f39aa8e45b2a0802554bab106fd23f468e018cf043c648ef89e055b50e0edf3eb91ab48109f64770953a5f6eb

  • C:\Users\Admin\AppData\Local\Temp\7zS3A88.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b