Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 13:15

General

  • Target

    41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    41d2e6214b87a19bea6d06a46fe3ff3a

  • SHA1

    68920a3569b2ab04d5fcd8b286aae19f385bd604

  • SHA256

    361faf27359446230d34a69ae5a3e360fc8cf4a5daa57da63c9e46f708e1b512

  • SHA512

    215c994a9acfdce5ffe31050f7e1848503ff488f02fe6205d8555a8145b742013d1e86e480712e7d1bcd29004e894fbd92c420b883020e39d6b9960a8cad51e1

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sJBA23CHQvqLGYKQFp9sdB2Jgm:91OgLda6l3CFGIFp+dI

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41d2e6214b87a19bea6d06a46fe3ff3a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Bcool\uninstall.exe

          Filesize

          46KB

          MD5

          8be20144dbd200c6de0c9430ed9280cf

          SHA1

          b81e3aacaaedd66ef0896acabc6983c94758e2b4

          SHA256

          634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6

          SHA512

          fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\bootstrap.js

          Filesize

          2KB

          MD5

          355acb11a6ff4196ce22321151904986

          SHA1

          281d1d14251b51b63c17feb7c7b35ead7a7155f5

          SHA256

          bb5942a870b95b49b30e4b1ef244efdc7888fbc94df44aeb49523beaae1c36a2

          SHA512

          9cdebc8689dc44900e681c7f8b3826284458fbbe7e09e8b2d6aa81bf26d3242305055dc961e0a9fbbbd37558ad536f0ab38841b21274191b6b301508e2726ef0

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\chrome.manifest

          Filesize

          116B

          MD5

          fc534b41eb46a1a27ef711dbed47ad7b

          SHA1

          73a378ea90c5791493f3c694a3e9f76900b4e2f0

          SHA256

          806cb50b0541e37f5ca06568420571f4da0eb06feb7116e83e8e3b137ec2efb1

          SHA512

          3b8df20a3b5f0a402c0a2a8416738ce0805eef77554020449540db9cbafb8025844114ea1578e27631ace900c91825e120cbe58e2f7a5acc26ec472847a8647f

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\content\bg.js

          Filesize

          8KB

          MD5

          9b2c768f7b97cbea7042e4e52f198a0b

          SHA1

          2449c32edbb2257d70c2583687e5c56b6bfab628

          SHA256

          f23f56e98e789fc72ac1d26c194fd98d9d3e250ba2ab6a4774184ee878b7019a

          SHA512

          131fddd13b1c811908ac029fdf549e05d8476f60348e8ed895e5575d2031b18f88cbc120d91c65a053a4b367081d026168f34900b1d5e74da14e976d9463078c

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\content\zy.xul

          Filesize

          225B

          MD5

          acd0eb1e63e59d41d2108bf5afed9555

          SHA1

          86605573b6528fd591aec042b22e0a3ab09b9b2e

          SHA256

          eeb517532b1ef5267e75e2b5498c4fd8f216a3ca3a1fe81f2a848dcc3106223b

          SHA512

          25566159096cea2ff1e1ad9aba56dcd4348aa4f5717785b8afdcc067b3b4b3ab99694b02b8ab3e0daf544ba8aa70f665a3eaafd0f72d87e77879ef7f4b7a124d

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\[email protected]\install.rdf

          Filesize

          705B

          MD5

          5465d104ea2aea88c13c950ac4a2a662

          SHA1

          993d55c5fcf97ee174a24995300f6c3b8fda5b11

          SHA256

          c69d3ab37fec524fc90c88969d7f131c2dce4ee347862204b11fa92cb8cc02c5

          SHA512

          7026b1c86c57a32108348ee2326ce44ee54896248b60b1f86972a1449a1123253fc86afe832ca785360f2d2b8c4f23eac23d88780b69cc245b4600cb0039d2d7

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\background.html

          Filesize

          4KB

          MD5

          8b3bfa3017e03ca3b70b4148bdee8e65

          SHA1

          ec0c05d4c2593fd2d91c845def834e7b3ebe0c26

          SHA256

          b23417f34d6cb33af5a931a96f1892846d3931d2785177f11c2964ce49492775

          SHA512

          3de0e22f990f59f0fcad34fea85730189a878c12f84f6f5b0e85c250cb152e3d97fcf8397dd8d45ef4e0d59c9930ec9379e0797585a60dd656e50eb9d6bcf9eb

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\bhoclass.dll

          Filesize

          139KB

          MD5

          4b35f6c1f932f52fa9901fbc47b432df

          SHA1

          8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

          SHA256

          2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

          SHA512

          8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\content.js

          Filesize

          387B

          MD5

          34248ac9228be71d57f634789b4b08b1

          SHA1

          d54a68e1d880f6d0f658c4fb18874f64bcb14d2f

          SHA256

          50b51f6094ecb20ad2bb45ba75f10371e7923a76bb7376ce6930e44555f50e46

          SHA512

          2dbade251344d0fdedb4cdda473d441fa298ece2dd1aeed42d315f5a5e59593c239eb6958171a5b14e9df5f5765e5e6e9367e4cd912e1dbba99f961a72f315fb

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\mbidjcmbjeebhmobpjcbmejhpkmimpcm.crx

          Filesize

          3KB

          MD5

          b6f23a3e798def6ba585d29c77303d6d

          SHA1

          bba6ca94b61ec5b8a39703b16a5bc4cb69eeeb05

          SHA256

          a3428ea04e575362c35cc66401cc14f8159898503e33a72027cb63bc2d830345

          SHA512

          291910b3ef5b5181f02504a4b2ceb344858d153c1bd7b2169e0d72e4da1d6363a93feac73c3a61e29be4569a9233445a05a21dc7fc240f0d9fd4ba8056f77c0f

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\settings.ini

          Filesize

          650B

          MD5

          6127876f4579b08e92688f16a584ccff

          SHA1

          d761ca261e6e332a6cfdfb027691c38c13c67d21

          SHA256

          b421f6febd92a4f56ca49777c54e5bc6f15d83b59a2da431428b9e6f2d533b34

          SHA512

          b2839177cfb6c56f3819cdf98276c617f1f98f7a64d1d83cc4f4b6b15e5ed43527b3bebe653b1c78d8abd9dfd6924c689bbc654ab059a8c047999e621e4b0ca5

        • C:\Users\Admin\AppData\Local\Temp\7zS6755.tmp\setup.exe

          Filesize

          61KB

          MD5

          16ef6e914973925977cdc5ef6b8b2565

          SHA1

          4815da2815975b33f5dc94d482e6dbc02588afa6

          SHA256

          6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

          SHA512

          c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059