Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe
-
Size
252KB
-
MD5
41d2e6214b87a19bea6d06a46fe3ff3a
-
SHA1
68920a3569b2ab04d5fcd8b286aae19f385bd604
-
SHA256
361faf27359446230d34a69ae5a3e360fc8cf4a5daa57da63c9e46f708e1b512
-
SHA512
215c994a9acfdce5ffe31050f7e1848503ff488f02fe6205d8555a8145b742013d1e86e480712e7d1bcd29004e894fbd92c420b883020e39d6b9960a8cad51e1
-
SSDEEP
6144:91OgDPdkBAFZWjadD4sJBA23CHQvqLGYKQFp9sdB2Jgm:91OgLda6l3CFGIFp+dI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1152 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F3605175-8294-F15D-DDCE-CFECF817AAA8} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F3605175-8294-F15D-DDCE-CFECF817AAA8} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\ = "Bcool" setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000700000002341a-23.dat nsis_installer_1 behavioral2/files/0x000700000002341a-23.dat nsis_installer_2 behavioral2/files/0x000700000002342f-80.dat nsis_installer_1 behavioral2/files/0x000700000002342f-80.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "Bcool" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{F3605175-8294-F15D-DDCE-CFECF817AAA8}" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\InprocServer32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\ = "Bcool Class" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\Bcool\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{F3605175-8294-F15D-DDCE-CFECF817AAA8}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\InprocServer32\ = "C:\\ProgramData\\Bcool\\bhoclass.dll" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\ProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8}\VersionIndependentProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "Bcool" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\Bcool" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 1152 216 41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe 83 PID 216 wrote to memory of 1152 216 41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe 83 PID 216 wrote to memory of 1152 216 41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{F3605175-8294-F15D-DDCE-CFECF817AAA8} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD58be20144dbd200c6de0c9430ed9280cf
SHA1b81e3aacaaedd66ef0896acabc6983c94758e2b4
SHA256634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6
SHA512fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e
-
C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5355acb11a6ff4196ce22321151904986
SHA1281d1d14251b51b63c17feb7c7b35ead7a7155f5
SHA256bb5942a870b95b49b30e4b1ef244efdc7888fbc94df44aeb49523beaae1c36a2
SHA5129cdebc8689dc44900e681c7f8b3826284458fbbe7e09e8b2d6aa81bf26d3242305055dc961e0a9fbbbd37558ad536f0ab38841b21274191b6b301508e2726ef0
-
C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\chrome.manifest
Filesize116B
MD5fc534b41eb46a1a27ef711dbed47ad7b
SHA173a378ea90c5791493f3c694a3e9f76900b4e2f0
SHA256806cb50b0541e37f5ca06568420571f4da0eb06feb7116e83e8e3b137ec2efb1
SHA5123b8df20a3b5f0a402c0a2a8416738ce0805eef77554020449540db9cbafb8025844114ea1578e27631ace900c91825e120cbe58e2f7a5acc26ec472847a8647f
-
C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\content\bg.js
Filesize8KB
MD59b2c768f7b97cbea7042e4e52f198a0b
SHA12449c32edbb2257d70c2583687e5c56b6bfab628
SHA256f23f56e98e789fc72ac1d26c194fd98d9d3e250ba2ab6a4774184ee878b7019a
SHA512131fddd13b1c811908ac029fdf549e05d8476f60348e8ed895e5575d2031b18f88cbc120d91c65a053a4b367081d026168f34900b1d5e74da14e976d9463078c
-
C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\content\zy.xul
Filesize225B
MD5acd0eb1e63e59d41d2108bf5afed9555
SHA186605573b6528fd591aec042b22e0a3ab09b9b2e
SHA256eeb517532b1ef5267e75e2b5498c4fd8f216a3ca3a1fe81f2a848dcc3106223b
SHA51225566159096cea2ff1e1ad9aba56dcd4348aa4f5717785b8afdcc067b3b4b3ab99694b02b8ab3e0daf544ba8aa70f665a3eaafd0f72d87e77879ef7f4b7a124d
-
C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\install.rdf
Filesize705B
MD55465d104ea2aea88c13c950ac4a2a662
SHA1993d55c5fcf97ee174a24995300f6c3b8fda5b11
SHA256c69d3ab37fec524fc90c88969d7f131c2dce4ee347862204b11fa92cb8cc02c5
SHA5127026b1c86c57a32108348ee2326ce44ee54896248b60b1f86972a1449a1123253fc86afe832ca785360f2d2b8c4f23eac23d88780b69cc245b4600cb0039d2d7
-
Filesize
4KB
MD58b3bfa3017e03ca3b70b4148bdee8e65
SHA1ec0c05d4c2593fd2d91c845def834e7b3ebe0c26
SHA256b23417f34d6cb33af5a931a96f1892846d3931d2785177f11c2964ce49492775
SHA5123de0e22f990f59f0fcad34fea85730189a878c12f84f6f5b0e85c250cb152e3d97fcf8397dd8d45ef4e0d59c9930ec9379e0797585a60dd656e50eb9d6bcf9eb
-
Filesize
139KB
MD54b35f6c1f932f52fa9901fbc47b432df
SHA18e842bf068b04f36475a3bf86c5ea6a9839bbb5e
SHA2562b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196
SHA5128716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99
-
Filesize
387B
MD534248ac9228be71d57f634789b4b08b1
SHA1d54a68e1d880f6d0f658c4fb18874f64bcb14d2f
SHA25650b51f6094ecb20ad2bb45ba75f10371e7923a76bb7376ce6930e44555f50e46
SHA5122dbade251344d0fdedb4cdda473d441fa298ece2dd1aeed42d315f5a5e59593c239eb6958171a5b14e9df5f5765e5e6e9367e4cd912e1dbba99f961a72f315fb
-
Filesize
3KB
MD5b6f23a3e798def6ba585d29c77303d6d
SHA1bba6ca94b61ec5b8a39703b16a5bc4cb69eeeb05
SHA256a3428ea04e575362c35cc66401cc14f8159898503e33a72027cb63bc2d830345
SHA512291910b3ef5b5181f02504a4b2ceb344858d153c1bd7b2169e0d72e4da1d6363a93feac73c3a61e29be4569a9233445a05a21dc7fc240f0d9fd4ba8056f77c0f
-
Filesize
650B
MD56127876f4579b08e92688f16a584ccff
SHA1d761ca261e6e332a6cfdfb027691c38c13c67d21
SHA256b421f6febd92a4f56ca49777c54e5bc6f15d83b59a2da431428b9e6f2d533b34
SHA512b2839177cfb6c56f3819cdf98276c617f1f98f7a64d1d83cc4f4b6b15e5ed43527b3bebe653b1c78d8abd9dfd6924c689bbc654ab059a8c047999e621e4b0ca5
-
Filesize
61KB
MD516ef6e914973925977cdc5ef6b8b2565
SHA14815da2815975b33f5dc94d482e6dbc02588afa6
SHA2566b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f
SHA512c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059