Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 22:50

General

  • Target

    651cdd414355841ed03eae0f42d1dced_JaffaCakes118.exe

  • Size

    315KB

  • MD5

    651cdd414355841ed03eae0f42d1dced

  • SHA1

    21396db1431c035499a38be2b406509269cb3ddd

  • SHA256

    4d86cb8df3fdd4b7642bad94773600690a3ab1f82a01f25fdada03915cf32417

  • SHA512

    f4bae86fab2890de4c3bb416508fbff6478c6daefaebbbe07d01aac6386b7949c3c26245178ff3d9aba070ef59a98891c4cde015be510d21b66d01fe0d43610a

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sWo5D0HBoRwtpTgqzZyxTuUJ7y5SQBz:91OgLda0uhmGTXd2TuUJ7yrR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\651cdd414355841ed03eae0f42d1dced_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\651cdd414355841ed03eae0f42d1dced_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\ADDICT-THING\uninstall.exe

          Filesize

          46KB

          MD5

          2628f4240552cc3b2ba04ee51078ae0c

          SHA1

          5b0cca662149240d1fd4354beac1338e97e334ea

          SHA256

          03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

          SHA512

          6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\chrome.manifest

          Filesize

          114B

          MD5

          6013199850d3548461731bde31d13b04

          SHA1

          494f9bf5f3e69106d320a5e3adb06cabb3d19eed

          SHA256

          dfb1d34b9290045937a82929c6e265abbf163200a0952473b2236d39cd1aa81b

          SHA512

          72d1e72844e15284aa1b5ef402a2b6f99b871dcd7cf6e2744211c5d42a22f6e53f88f868bd53c398b45ce397966706a8ba3766dcbe948848402cdd42f649ed2b

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\indexeddb.js

          Filesize

          1KB

          MD5

          859f63be92dd240822e0c13c28de0aa2

          SHA1

          597ba14d21bfac5aa2638db5ffc170cc5cd544b2

          SHA256

          00ce24355a8b221d8fa19566147203d7a20cca2bc7139e7a74e1276584a5ae41

          SHA512

          464ea9aa0a54d648f5796d8cb1659d64ac0309b08801893e9b301e362a0bf2f94ec4fea4794e2f00a31c7e9773008fd1441e02c2fbfbd667425f229806229ad7

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\jquery.js

          Filesize

          91KB

          MD5

          4bab8348a52d17428f684ad1ec3a427e

          SHA1

          56c912a8c8561070aee7b9808c5f3b2abec40063

          SHA256

          3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

          SHA512

          a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\jsext.js

          Filesize

          6KB

          MD5

          e7e44fab4a978e809e419b52c7be596a

          SHA1

          33609acd6da1c778047cd05f4d99f57083d58ef4

          SHA256

          88ac219fb3d9f274aaac4f7e0a229d45a85db97c7019b66ac7ca141322bfd631

          SHA512

          d8beb6b724a3869c6d8742da5c651d48ce465c04f15b516efc2998fdfe814c493017d7c44cd57ec9a5a7a04ee19e83d3ab50efab8806f4323ff7c7472e182a04

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\lsdb.js

          Filesize

          1KB

          MD5

          ea3d41cc1ab2a2c0de75ec6a676cda65

          SHA1

          6dae2bf97ebeed9b6f21b1381b357739e1471a28

          SHA256

          bb61b7b3f02704086cdbbffbbec12fc3c4e50351d2ed167159f6b6e790656e7e

          SHA512

          18b2d30d121a9af0c2cf0b9457a77341e94d8f1e7e2795d388a829c387664890f42af3d24c5db5b07f6f1f754595fb10c1aca60cf9b226de15c3f4bb01a3c22b

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\prfdb.js

          Filesize

          1KB

          MD5

          6e91665b19267098c00d4b22a7b4d509

          SHA1

          641e6ff764c4f2eba429e333267d3b23ca2f6658

          SHA256

          df0e91e93571f16c28a9065ec38bb0b8be1b0f71deb20d9086f8f981e50089b2

          SHA512

          05b9df996e3381f9c8a609c0f7a313ddcf30322857a579b4700c33040e2942ecf1da65d613b90e9700032876d7731346fc2ac9f63ea8f095ef0c159ab4b31c33

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\sqlite.js

          Filesize

          1KB

          MD5

          27738c8fc50818be97b66e116234d78a

          SHA1

          cf201672e2e576a4ead07f96f0d62445f0964a9e

          SHA256

          4afea838167415317b337f7012791808294cc022b0d235dd9a34bece7a983a8a

          SHA512

          49dd645328133f77da3751b7a3a05063220e3cf00c527c87251350a865bc46ae8ee1cbb58e751f861509213507aaaf59694a51cb4be56abdc7769c043870bb47

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\content\wx.xul

          Filesize

          228B

          MD5

          be8bd10f6ffa5f554ece7ed425d828a5

          SHA1

          b20ae6cff6fd1dac37c23053e8a3fcee6942386f

          SHA256

          56df291b0b42f12c3d90b150e42c742463ae570ae448e46335596a1d0f905965

          SHA512

          4cfd5569efdf1f556b9da861c18585c95dbfd4a38dd5c2b725ac94c93c4204273725b46d5d2b80312eceeb623e25a92d13c10dd4be1dcf78a92c5391fcdc5cf3

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\[email protected]\install.rdf

          Filesize

          677B

          MD5

          633cc9ee1a09c9752c7c34b8d456417c

          SHA1

          12aa84b333d56df8d4520da7bbad2e6c598fec17

          SHA256

          9939fda14e30b2bac072d3770ccb2fd676b8b1b1ca983eb8d1534c5ec6b7cf88

          SHA512

          7f7bfcc11136250e53c5d6c535a431c41226c194a3c93a20d8567ad8493310795fc21b77d4a4693b2b4060f5110883b9d87b05502735c69c20b429d041928130

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\background.html

          Filesize

          5KB

          MD5

          043874cfe0862cd48ddcc5e30e4d0e29

          SHA1

          4e373730424eb22ff1dc1e04f5e556df9e823801

          SHA256

          92e3cd8fbf080201471202959240768d9146e5f84889490818ac115ad66a936c

          SHA512

          609270738cb9d7bc686a3f340bb19cc80e0f7e6ccf17ff195748b76ba40a08d2785d9b21e7f9d3d610669e634bcf13a421108a7680f3d5edfc8a85b6dbf5e0a6

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\bhoclass.dll

          Filesize

          139KB

          MD5

          4b35f6c1f932f52fa9901fbc47b432df

          SHA1

          8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

          SHA256

          2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

          SHA512

          8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\content.js

          Filesize

          387B

          MD5

          787030145bc939bb27ebac987da1ffc7

          SHA1

          158b1408dcd7d9870862f5e0e306c1b042802213

          SHA256

          c0d9bff43fee3a322c2b2cd0b8355de88a82b900f12e3582471466b43d788618

          SHA512

          9daec765159abc87e5a2a8f32210a5db8f06806b7acdcf8f02999d809f04f9de446aceb08de1aebab5a981aea4823080d1afd08da336249cb9ab7da5b8d2bd4c

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\mpnhkkpkjadaijhgakbcofgejhfiedgb.crx

          Filesize

          37KB

          MD5

          f450df59f129db486923e49b7727d20c

          SHA1

          ea115008a4ae6abe2892ba75bb3ffed60a2a2314

          SHA256

          808aa8f8b82c5ca4cefb83b429fb05c8eecd0d01357181c98cb543d8f4986b82

          SHA512

          d390c306c9328336b6df7e04208fc0f1e469dfaa04d28da2678cc6239cebc46763f056d065be206dcf2d8381512a8671e9826c11b76d9bbcd3ab8cdb596c9c18

        • C:\Users\Admin\AppData\Local\Temp\7zSADCC.tmp\settings.ini

          Filesize

          610B

          MD5

          d291f05e331df1348a02522ae2f7c587

          SHA1

          21f59ecc7fd031fbabc765cf0a4d82e4d1e73adf

          SHA256

          85fbc082e43c0caec5f478f8c97ca197000f8d803352f31b9cb6c6a49e434d7a

          SHA512

          737afba4017515731e4ca5dce3f5a1c1c802356d85896e67a5460f90370f4074e27648a3e3269ec2e18c30d5c4e463927e12c4b6be3e52cb5169ff7dfe14d6a6

        • \Users\Admin\AppData\Local\Temp\7zSADCC.tmp\setup.exe

          Filesize

          61KB

          MD5

          201d2311011ffdf6c762fd46cdeb52ab

          SHA1

          65c474ca42a337745e288be0e21f43ceaafd5efe

          SHA256

          15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

          SHA512

          235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b