Analysis

  • max time kernel
    92s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 15:35

General

  • Target

    355591e41e39add1249560c92e541361_JaffaCakes118.exe

  • Size

    313KB

  • MD5

    355591e41e39add1249560c92e541361

  • SHA1

    ef8d02d950e4b84a1bf52adf63bd3fc4b80b9f48

  • SHA256

    28077e3ab85f1120c06ed28497b7c6a66bdcc659a0545c3809f921c2ff9bfbd3

  • SHA512

    e580ae9ef28d1828961306178c5218cc4b98f0993d296dbf6f188ee55715725c4df69fc53492968a3e7992edbe90ed62633dd4ae14f91e08e632168fa18b8ddd

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sSbRB5OyKZDS1TtvcsgHV62JoUrmOXBFwEzdAASUm:91OgLdaDLUGVcfHV6+oUfX3NSUm

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\355591e41e39add1249560c92e541361_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\355591e41e39add1249560c92e541361_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1504

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\DownloadnSave\uninstall.exe

          Filesize

          46KB

          MD5

          2628f4240552cc3b2ba04ee51078ae0c

          SHA1

          5b0cca662149240d1fd4354beac1338e97e334ea

          SHA256

          03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

          SHA512

          6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\chrome.manifest

          Filesize

          114B

          MD5

          328aa18e3ee0c7f5b7ec84fc945ac211

          SHA1

          7cf18f915f0b6865caf0e6aa405fda69cec86c52

          SHA256

          be829d14f9d2b63a88727fc02a9a243b91b04a7864e898b8e002db58a8f268f3

          SHA512

          a56d671f737d58e403240e386ce86482fa1d87105f527fc199067a5bacd5ea3a77bc80bb5d824dbf377e04a05c854af78525a3d44eb659f91625d613fdb62618

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\indexeddb.js

          Filesize

          1KB

          MD5

          e7a3b21738a4c2f2be311d77ae9b4871

          SHA1

          0eb4a85a6493a1b4a869d3d87dcc97738dd29d50

          SHA256

          2cc55b3e51d5b4f61f0f5ca5db1695cf081c95110ca7147de811d037890ecba8

          SHA512

          450d0519be607cd5a89b781e42cfbf8d76fc4baf0f1572993a7b854876d1242a011d2a5893ecee50bbe1de2814eeef774379b501140f3cfbe5165a9ab8719ca6

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\jquery.js

          Filesize

          91KB

          MD5

          4bab8348a52d17428f684ad1ec3a427e

          SHA1

          56c912a8c8561070aee7b9808c5f3b2abec40063

          SHA256

          3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

          SHA512

          a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\jsext.js

          Filesize

          6KB

          MD5

          c62f902f4c89722c6970007169b7c2d1

          SHA1

          fea6bbbdb6f99a76804d0a8830f0eb0fb84db050

          SHA256

          b93ab8a5b3ddefbb439162f4a273662b784c79467adc9ba868162fd588c34232

          SHA512

          0e46057cbe1603fe13d7d9de3c15f0bfebfe183086f7590cd05c21dea56de9aa9ea0b53a89c43e4e8b7878b4bc7019d0a82070ad8a7e9a78170914f8029dd161

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\lsdb.js

          Filesize

          1KB

          MD5

          3096ef2a338b5b70bb2af15c93144e0b

          SHA1

          4038dfa1db3fa5fcdbc5199f9f92eec9e4168c9d

          SHA256

          cc5aeeaa04a95bcc2dd98fd0c80a1628c97f2a0fc1c74c3ff5890b0a28854247

          SHA512

          9ac62d82c9d5f47675ee90524cad95e0826d5ce92a39124bba89cc8df0e4f850e5290f44ee7755b36fac39456e6b1f065f94d0c58a407c0388142908275e3a68

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\prfdb.js

          Filesize

          1KB

          MD5

          8188009e2f5a1b0efbeec5bf0542be98

          SHA1

          85d8684eeae630b0cb79d3eeead61f628404b8b7

          SHA256

          84f33fdb46dca36c5882ae89732350f11c3bc21506c1b4abb62c7d14dcf7d97f

          SHA512

          f491bec1b142fd42678237e0170b302e7a63a8bf73e957f397bcc8d62f5325a1f87427a1b0cee368bc6f5cd3f48d93197e7d1b85b842c25710eb74332d74389a

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\sqlite.js

          Filesize

          1KB

          MD5

          26323bd100e3ac531184cb987130b5ef

          SHA1

          f986c6c8a117810afa1287fd188e356b48ff95fa

          SHA256

          9ca1d8d2cd0321c8d3ca4f48a5331c67b1c9ddcc3455f8d39400058f3b34e423

          SHA512

          6cb5b8ff2187f22c569c547fb6f2bb1666c2209fc1a932a76a80908387062dede825a9af699cf12d00a6b383af0c36c049b7e0f57da46f7a4248c3a6856afcab

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\content\wx.xul

          Filesize

          228B

          MD5

          cf195a76fea78e61a14d2757ad4109aa

          SHA1

          25bc0c3641c32e606fcd571dbfc2d87f77fe5f4b

          SHA256

          9aa240e0eead57993b4759bf3d6416f088af7b5f5136575cd2927b4fe300b3e2

          SHA512

          4ee1ce520de6d9faa7e511413ea1064dbe2b3f1e2df93d106fca597a9fdd925f8541302a39f9d1449b4d92c3ca7d5c338424b99c51c1dbb5b9fb12935cf7b79d

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\[email protected]\install.rdf

          Filesize

          683B

          MD5

          c1778ff4b0787b636b82d709f8773112

          SHA1

          34b12e383443be37f13f39407f3903ba3006746c

          SHA256

          92de1f0909a5ced8ed7f771bd0bdf19e480cb0b88667cad7400a9c8038264d10

          SHA512

          e9ba3a8dbba97182402ef8a010b09f7e9d536c2e1028b83a591d59d8a648e9bd557b92738626f3bcd885830a5f96a8ca1e1ebd7fc789acb95bd26e4c4d120fd9

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\background.html

          Filesize

          5KB

          MD5

          0f7b59f4ad58bdb3fad23eff4e8f5942

          SHA1

          2c1ae6487da8c2f7df78d4e6b85b1ed5b86cf82c

          SHA256

          5302079c25cc537e6e64b1884a177e0234312027d6df5a6e7831290875ab8d20

          SHA512

          af7d2e442dd1c2a00ab29e224108c454befbc6f4b63aeb925a0c3a3f97164a83fb43a64b96fa1e6e7bcd8dd651008397d234ef79293940837ecd4542ffe460fa

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\bhoclass.dll

          Filesize

          137KB

          MD5

          ac13c733379328f86568f6e514c2f7f8

          SHA1

          338901240fedcef4e3892fd4c723c89154f4de05

          SHA256

          7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

          SHA512

          35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\content.js

          Filesize

          388B

          MD5

          65be156f617701ae09ca8b92162487ea

          SHA1

          4a950030ddd09f3628aaad034d1e4fe11ce26f03

          SHA256

          c3c6038bd11497e5ced1cece397dd5cda258709f79ef8e16e62973ec74fddbee

          SHA512

          deb90ffb08d36250141039edf7fc3f8bc49e8b518c5f7b871fae58ad415911940f451ad390f93c45f979268338766b7b58174e8a76cd0f5b679373a537ca8ae9

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\ekegmblfmifcoghokljfejgebndgjeja.crx

          Filesize

          37KB

          MD5

          75c5de7a492a4b68cdb5257839724ab4

          SHA1

          6332abad09c569f2bb8893ec70b4b49f74742dbe

          SHA256

          52f3467e6f85ae4052813437ea7adb1f0f38c1412dd01ab8ce90e6ff7d8fb6f0

          SHA512

          02110edeb2b93969adf8e70d95c67bc02edc81b10b32184d54f48866ae7f5288b3f1000eeda9ef976fbfb5039f0c05232b48b33ace050b5c1033e63405150d2e

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\settings.ini

          Filesize

          618B

          MD5

          06fc6065e426ebd95d586b554e680f54

          SHA1

          b97a7555b81c25532bc2c0ac40c11e32238085c5

          SHA256

          01141ddfffbef284b3ab58edf6f23ad740d231861eed22756a454089e01c1d16

          SHA512

          8a0fcf5c2a2b638ccb8aa1bc2060483c5dbc39889dd6817487f0b893370961c5378c6e7155fc0f36678aeadb62e18e0fd1183d66745b148e305a29214a118dc1

        • C:\Users\Admin\AppData\Local\Temp\7zS8D3C.tmp\setup.exe

          Filesize

          61KB

          MD5

          201d2311011ffdf6c762fd46cdeb52ab

          SHA1

          65c474ca42a337745e288be0e21f43ceaafd5efe

          SHA256

          15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

          SHA512

          235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b