Analysis

  • max time kernel
    17s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 07:33

General

  • Target

    5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe

  • Size

    257KB

  • MD5

    5afdc3fdaee35c0644d5cf62fb7fe58c

  • SHA1

    5558383b2b15602ced0477cde056f56f009d69f2

  • SHA256

    e4d57e56774936a8c40f67d4378fec5252a9d2c20512ae2f4ec9ad4144a3da07

  • SHA512

    a25a5168889718939109280f1e0725671127190d80493c36b88b22ca0e1185855c2e7e417641bacc5f17db0de608463d2e13b9b489cdaa778ba9baa0c50a0b89

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4s5VrWPtxLNAmEnJt86HI4m7iX:91OgLda+KvLNtEnJH/m70

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5afdc3fdaee35c0644d5cf62fb7fe58c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Bcool\uninstall.exe

    Filesize

    48KB

    MD5

    a724dac649142fef71fe4b529684e969

    SHA1

    e2878e84886ec53a1332ad969a825062526b5cd4

    SHA256

    b58c58b5073034d74c5d93902bbb9d402be063e907bdf77115b55bbb99af21dc

    SHA512

    9f475ad52fa2b7f82e74df87c02e42f937b5e3b62773b7d51cb53facfcc8b4934ad3c2fc21496cfabaa4dd103a309ed5cccad1ad3d6037f6c4f3a540e3e9d5b3

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    355acb11a6ff4196ce22321151904986

    SHA1

    281d1d14251b51b63c17feb7c7b35ead7a7155f5

    SHA256

    bb5942a870b95b49b30e4b1ef244efdc7888fbc94df44aeb49523beaae1c36a2

    SHA512

    9cdebc8689dc44900e681c7f8b3826284458fbbe7e09e8b2d6aa81bf26d3242305055dc961e0a9fbbbd37558ad536f0ab38841b21274191b6b301508e2726ef0

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    e98faae8f2d6215e41d526de2510b6be

    SHA1

    8a2bb72ec487982d40e7948b0054e27b9e615ee1

    SHA256

    15c98c42824ad62dc7e151d2c7ca1bdf857e926ac7eecb1ac259b8359f18ecef

    SHA512

    1f7a0b4072a7f9b883b09501cc5a374dbf64dfa7109a98cca7f664558154cf08dbaa9a0c05ae8820d64ca987018b5f7826f2684596de8853f36b3025020be502

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    ef96a2b335017ada820712f0fb7897a2

    SHA1

    2af3e91be76a63827db52478edf9c8110f5a3213

    SHA256

    48c58de819c4df798dd3b857a6f4f0d08bd521217ee888062288256cee916e2f

    SHA512

    653f2be995a569d9dd2a12650579ed16da55899a6962a3a8d1f83ca1e1caee23fffa24a7779daa2cff03119f5bfca9a93dcdfebb0edc4bb18951479a912bfcce

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    0887e3346e2b6f1cc25d05d98f7ab2b9

    SHA1

    d304a56857fbc44f0021fe030c29b2a2a249301a

    SHA256

    eb3c66ca082eea85d97336b4d2e085ff5e6f3d7ee2cabf095371b7440747f6e2

    SHA512

    648ed499d5059d118b12ea2cad4f6d88084f84f89e95da2679d910f35c3b25e58bc8fc166070b9ab1e8aabd8cbbe4d86bf9234fba0d2df46cde83d7c691d87c1

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\[email protected]\install.rdf

    Filesize

    705B

    MD5

    6830bbe606fa1513fc4b63bfa0f7ce5b

    SHA1

    4da9b20abad4e6983ccfc2cbfc055f3facc2f056

    SHA256

    b07a31c2b1a58bbebc35a055b2979f3a34d028818f5819ce0df32df20af9a63a

    SHA512

    8bc1c9edaa3f13282ea63ef0b89d6863a4cae71783b93c1b238e2023763fe74d8653eaf93987d8e8f258a2c3577fd81078a01b39267cb14299ccd09dd147009d

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\background.html

    Filesize

    4KB

    MD5

    c6c12e07ad28d7239179e87a8c8d6a49

    SHA1

    dd498fa252ef25dccbca03dc207e986ed1813036

    SHA256

    04e0fbe5c0a2d4756e5a3d641172267527983766d1d57d1842212c54d81319b3

    SHA512

    13f42351edb677a18d938e7ff0bb04eba9c67db57e9b88c66f5046e30fd3c52a2c37b0b11ce6f7fe8390d647adab97b0ad5c03ed1cbc9bb1bf948e37ffd2500a

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\bdgacacilhmodpglacdjflnkdjoamcdm.crx

    Filesize

    3KB

    MD5

    9abd92a1b9fbf1e293ee677e3ff78487

    SHA1

    d6ef3d21fa091f66d103c4cc2604703e3c8fc0d2

    SHA256

    ae53bdf5ae13d6ae274ae5c607f61ce966cf2a645fcf547d7f4e93d298be5afe

    SHA512

    699bf70a62f8311c966bc746aa8e1b65fac0b4d88e684ed227606e6c681649ae0a225bc0aaf0483a193aa90c481415918331a0f63be2eb67f992e88823129955

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\bhoclass.dll

    Filesize

    164KB

    MD5

    474a025909c75c607905b9e2cae8a56f

    SHA1

    83ed7383c8aa53c6134a2b0a701b7b272c5c7c1e

    SHA256

    25ab733f417a9def519ff2443f38cff31baa02743cac803f53f662c875b9be5f

    SHA512

    29d14b6143a45c76904beb6d7ba2d8020f13cd407c66d6eed8825b9e722138f11945a3747988beda0f5bf33acbcb3fcdf8a411a2fc9b07fe501938dc590d03f1

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\content.js

    Filesize

    387B

    MD5

    34248ac9228be71d57f634789b4b08b1

    SHA1

    d54a68e1d880f6d0f658c4fb18874f64bcb14d2f

    SHA256

    50b51f6094ecb20ad2bb45ba75f10371e7923a76bb7376ce6930e44555f50e46

    SHA512

    2dbade251344d0fdedb4cdda473d441fa298ece2dd1aeed42d315f5a5e59593c239eb6958171a5b14e9df5f5765e5e6e9367e4cd912e1dbba99f961a72f315fb

  • C:\Users\Admin\AppData\Local\Temp\7zS3A42.tmp\settings.ini

    Filesize

    891B

    MD5

    a2e45f96742b34caec9aacea6c3155cb

    SHA1

    0036564d84bc7438816837195e74d8f4b2d3d331

    SHA256

    63c7c9092e2ac477a2c5fa379b2c3cbea89f39ae369207aed6257547d2b8d1ff

    SHA512

    16a175cdf566a104988a3a9b199961a141026bd0e0a06f7e503809bb0cf97fd9e3315c1cfcfac9367345b2321c17aa74ec5e6b72e45c3e7a907bbdd8dc8f0e11

  • \Users\Admin\AppData\Local\Temp\7zS3A42.tmp\setup.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • \Users\Admin\AppData\Local\Temp\nsj3B0E.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b