Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe
-
Size
251KB
-
MD5
3adec73bf2724b4b3943727801238ee9
-
SHA1
c1e9817ec5cecd23299af07e831425bbdd205e17
-
SHA256
67eeb3aa54da3d391f401f6ad0f1acaadfcc87f72f4481fae98901a29caf3779
-
SHA512
4d4716f759d3c7c513ce5951b1b7fe35501eec148fd960243aaed64a08ae154fcf047de6285bad6f3a25fe893c25aacf32c22085dbc0283cf90bcb2f44120d22
-
SSDEEP
6144:91OgDPdkBAFZWjadD4slNSwi1X9/4vkseXW1sejsU9ZXYQ:91OgLdaKQ1X9/CCewYP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3656 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3656 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5BC09379-0840-A088-FC7C-2C6D94E45520} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5BC09379-0840-A088-FC7C-2C6D94E45520} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5BC09379-0840-A088-FC7C-2C6D94E45520}\ = "Bcool" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5BC09379-0840-A088-FC7C-2C6D94E45520}\NoExplorer = "1" setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000700000002346e-23.dat nsis_installer_1 behavioral2/files/0x000700000002346e-23.dat nsis_installer_2 behavioral2/files/0x0008000000023484-80.dat nsis_installer_1 behavioral2/files/0x0008000000023484-80.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{5BC09379-0840-A088-FC7C-2C6D94E45520}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "Bcool" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\ = "Bcool Class" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{5BC09379-0840-A088-FC7C-2C6D94E45520}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\Bcool\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\Programmable setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\ProgID\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "Bcool" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\InprocServer32\ = "C:\\ProgramData\\Bcool\\bhoclass.dll" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\Bcool" setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1372 wrote to memory of 3656 1372 3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe 83 PID 1372 wrote to memory of 3656 1372 3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe 83 PID 1372 wrote to memory of 3656 1372 3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5BC09379-0840-A088-FC7C-2C6D94E45520} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3adec73bf2724b4b3943727801238ee9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\7zS787C.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:3656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD58be20144dbd200c6de0c9430ed9280cf
SHA1b81e3aacaaedd66ef0896acabc6983c94758e2b4
SHA256634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6
SHA512fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e
-
C:\Users\Admin\AppData\Local\Temp\7zS787C.tmp\[email protected]\bootstrap.js
Filesize2KB
MD51ea48e82d5c30d17b4f767d24d2b931b
SHA1a66ee0461eec71405db0d55f8a99f65347cfa2d7
SHA256e12cf6794432571425714261d2118728536cf283963cccf8f1f7439945acd19e
SHA5121e098ebeead00045a2c42525b2874fb107096ced44f6240a22317957293ead172ec18da183db4cbe1fb02a7ea7e9e1dd37d01caba44830e8b9dbf52d99e56a96
-
C:\Users\Admin\AppData\Local\Temp\7zS787C.tmp\[email protected]\chrome.manifest
Filesize116B
MD5205c5cc64fb1f9d8b9eb621bc66f67ed
SHA1f41ec55ada693d1354e4187356784788189c498a
SHA256b233b9faf0217d9d5e66e256db9ee9c1bd1da04ed9cc1150caac480aacc29294
SHA512d259c078f875991e8cab444fb18dce44eb632209fb3fea0b89ceb27d56c87f9b46986467575a826e3a5d1709765fa096972f37eb6f7ace2d222f3dc84b9dadc0
-
C:\Users\Admin\AppData\Local\Temp\7zS787C.tmp\[email protected]\content\bg.js
Filesize8KB
MD5069a32b5200c68a7fb56d775b0f91538
SHA1986171a568318809128ee42b21249ee75bd14810
SHA25667b2b045225cc4ccda128d852b0512ccd212c22aca9c096f67f285a9331b753a
SHA5128f380a3b21034f94038a8447633a558cdfc7fcadfc91b923da26f1260a9ae2ff5aa2c81b0e165a6448d9f69341b4a4a4490516e8b3fc607de71d849b2bf0027b
-
C:\Users\Admin\AppData\Local\Temp\7zS787C.tmp\[email protected]\content\zy.xul
Filesize225B
MD5c9e9a6735d9abfac26522477f2f5ee17
SHA1ce1821a191046737a02b2811c5322590ca61638a
SHA256d5b8cc1a458c1dd37c691ed670f53bbc72adb2adb5ef0b369f00d3a4f1de5571
SHA512939e921fe8e6c8ce9b1fc3c1502ab51b9db7205cdd50e2c11fdafcf78826f6cafe3b76742fcd91c046a97ca118c46121ab66b7df149ac91df3b9fe4407553de1
-
C:\Users\Admin\AppData\Local\Temp\7zS787C.tmp\[email protected]\install.rdf
Filesize705B
MD5c8fece48de41e4645c9374f5c4c5d24c
SHA1366e9d66f8181921f0361349980d21625e14c53e
SHA256796b240e6ff4d566884d0b23f57c53a2a130851a974e10a3ce33a8eb7dbb243f
SHA512e68ab9501728abee161fa6db9af57a43965bd32dc9b6139427c2deb9810d38882a9fbc7caaac7866fabb06880c464cbd1a239741764ef02a004f8b315787c2c5
-
Filesize
4KB
MD5d33db8c570773bde2d7874a3902bc660
SHA1d111a97da036aa94f8928d57bd496ccdf6ff6367
SHA2568925e7e5a443c3e040a58144f76a65eb28199b028a47d257066b5f8672465a1d
SHA512e7b3d4edd3e538c26cac27f05cef48141c3177f50b91bd715b8f698128d6abcad48b3fbb6ebe839e761477049b3c6c9552230ea0cd61b03ff10e2791a402a1df
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
387B
MD58d7be65caa5f6daac8316048b0d2eac2
SHA1b0727d5b71318a73859616d33031591e63181e2b
SHA2568d055be6f408351be6097a4d30179907f5c37ec0b5413f73096c8fee25d408e4
SHA512235bf789a4d5154cc24afcb71192585ce58d54ec00a5cba5983c4ac2f7641b91b6d68cac34c1c14d2a324c45ab977e5c510b8552f0a877bbb92add451a2c1461
-
Filesize
3KB
MD5b90a0bfc503d020927940112ac7dfa0a
SHA1bdf6689046994bc731b95a9ec3edf336063c1e70
SHA25646d64fd6eb23181c16fba115f69b00d00495e86b3f48dd8782524afc420f641c
SHA51223890d746bab8660970e92a411646766f010bc97e6e1d6ffa25b22190f9135cdc8181cf56fe5954184318ee33aae1e5b16e4a6aff766a97ce61d19056bf82ec0
-
Filesize
650B
MD5f5a77ca700ea56617648d1ca1e395a51
SHA1364d1b240655d0963b568b14caf6500c12946433
SHA256499f531f2ec4f98a7756db0b3671ffd1215321e53d50d7dfcfd987b935dc3cce
SHA512cb2732201c6da7deb918bbade8e2e9f88d6be758469912ef3808cf0527046a0341255c6dfea525c8bacd5e2f9249d276da3a9893f3f9687409f806d5e7a16934
-
Filesize
61KB
MD516ef6e914973925977cdc5ef6b8b2565
SHA14815da2815975b33f5dc94d482e6dbc02588afa6
SHA2566b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f
SHA512c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059