Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 08:48

General

  • Target

    8579b446236c828f9225f23b772b6d37_JaffaCakes118.exe

  • Size

    313KB

  • MD5

    8579b446236c828f9225f23b772b6d37

  • SHA1

    771a89482c73c40e28dcd87f64febca57be20d46

  • SHA256

    cfa6c571858bcd6687767259bba9877b31de945be36cae50ad4b511a602c673d

  • SHA512

    357a47d993fe5c5808d65a82e5d7dca5032fee152110617e397ecac7cc334dc6d045b9f119c527dedb43ae9c5af447c323178d7a019b9684a72cabadbff5c6c8

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4stmHN1Bf9pkgs5INW48Bfxjbd6Y6BbIRu:91OgLdakmBfbdWdxXVu

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8579b446236c828f9225f23b772b6d37_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8579b446236c828f9225f23b772b6d37_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:2804

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Codecv\uninstall.exe

          Filesize

          46KB

          MD5

          2628f4240552cc3b2ba04ee51078ae0c

          SHA1

          5b0cca662149240d1fd4354beac1338e97e334ea

          SHA256

          03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

          SHA512

          6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\chrome.manifest

          Filesize

          114B

          MD5

          81019c362bc3cb22843b7d60c35afdda

          SHA1

          5d3f48b14781aaeb12993d7472cac5f3de265929

          SHA256

          f36b6c040f4520e147ec09b93b42509eb967e0da5649e0f44cd60bd69876ef7b

          SHA512

          d00b4e124476c432e2fc4227a964d809651e13e123dd80f8f2077f592933614e3014043de337a40da267729762f1fd927cabbeab1165735ac9c91a40dbcfebad

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\indexeddb.js

          Filesize

          1KB

          MD5

          3229d6d5f0711bfa97bc2db06cc32563

          SHA1

          a750fea6033c42b7b1bceca2c660e9ef0f351ab0

          SHA256

          ad63369f85d7ab9775ef675de6958589e5f88aebc34e12d9a41b8b6e5b8c2013

          SHA512

          617806423c094dc295408423e08a02ccdea16f6cc6ba7f9713368564874367f30fbc1ba669380f0a842b40f900b85a96e9984c720ddc5543c38eff6107571ef8

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\jquery.js

          Filesize

          91KB

          MD5

          4bab8348a52d17428f684ad1ec3a427e

          SHA1

          56c912a8c8561070aee7b9808c5f3b2abec40063

          SHA256

          3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

          SHA512

          a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\jsext.js

          Filesize

          6KB

          MD5

          5343b6447f3f45423a7243deb14f8b94

          SHA1

          f765d2eaac07baf86f4c59f969f50f080e140390

          SHA256

          c39cdd4cdf3e770554e412eaa086a8aef9c5f458053131b678b43332c730a795

          SHA512

          68a8209fb95ad31e6ba31f56c23b0d0132bf656a41ea351958b5d249f7513d02fedc8bc6048179b3611e6e433445abc516e3e6ec7fa9ba3c0408e8f0a1a3c571

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\lsdb.js

          Filesize

          1KB

          MD5

          cdbb7d4dfff47310b1d90c7e9b2ab722

          SHA1

          d7b14b42474a134ff58aef380d6467a24d0b932d

          SHA256

          b5fe4e76565c25148d6a0d227defa21684ea13d63bbd1275f4c57ef2d670d220

          SHA512

          d7d0c429eb1b87cf99aac86f078b505af94c00914cb0ee9ad7ce6e79511667c63c5a6577f72a32182b2b2ca2807cfb94cfdf50188f2183c9d017fa539e59b5ac

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\prfdb.js

          Filesize

          1KB

          MD5

          e9262d7b3057d168f27dc6d29e2413a0

          SHA1

          e6ee90e1041829ec053af5a8702af732eed50902

          SHA256

          be03514d1031e3b9cb6cb963dc4df56529369f39f41304cddf212952682c8195

          SHA512

          a80d23a3579f613c1b26af640d15cc150ca40c42b750e1f2dc1c5da38ac3da594791db2ab57be9800a56a3573cd49732f55009f40c26f436c850a535b61e646c

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\sqlite.js

          Filesize

          1KB

          MD5

          6e9f18a7f666af6aaaa01deed1abe85c

          SHA1

          2b69e632aaa7dbf6a24d2dfb7d8449d67c516879

          SHA256

          e85f116ef896992f7de05fd4a3abfa48496bd93322fb31f8b08764a6747b853c

          SHA512

          52a2bffaac7004fc299420abcba7a887570604e49edd9fa3b104561bab04872a1880bd88627a794073055c6bacf40721aaebb45124e45b3fc2e91af3e0eefaa1

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\content\wx.xul

          Filesize

          228B

          MD5

          890376e70ee6f3bb152fcc7807c84e3e

          SHA1

          c1de5c67e79f7c9f7b58279b120094e58eb59410

          SHA256

          e3d492a88960056cce8db155e96d191b1c88e52e7ecb1b3dbab9d57609c5a653

          SHA512

          133a7de6f8917af353cbf144a1562110a92b2a56fe720b38ede1575db655f814d0494fff4f4e51f29401e272cf5d9a228762d020e39d195c176f960c143defa9

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\[email protected]\install.rdf

          Filesize

          676B

          MD5

          dc2a1f2fdcd27f24b6d9aba7a2798776

          SHA1

          d2152b8978d2f3d3244a8a9149b6f5ba1cbdc75f

          SHA256

          6c7c1b1bec74075aed0699786c86f2252a7d3ec0be648e54f1143cb2662d7162

          SHA512

          31f04db9ab71f2c97cfb05528f2dc48415e64fb980408fb2a14d157c415e68d5ae8b67ce1570465a75df0453391e02bd2e817142a6ba5b5be9f0042bbb206c5e

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\background.html

          Filesize

          5KB

          MD5

          05f1fa764bf515306a78f6ed0f0dce14

          SHA1

          0b3097e484743960baf9f0d719917d07cc273517

          SHA256

          47cd08bfc26158b55003fd9eb3177500d583df335a287cad9a8f1ee49bf036ff

          SHA512

          6b4dc7e87a43a06298d4ff7a46fec15718bbb9532141aa6ac040adc1370066df4f2ecd1079c728e9d6c85e924fff53bc6d6f4ef6ff78fe54042977e2e76180dc

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\bhoclass.dll

          Filesize

          137KB

          MD5

          ac13c733379328f86568f6e514c2f7f8

          SHA1

          338901240fedcef4e3892fd4c723c89154f4de05

          SHA256

          7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

          SHA512

          35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\content.js

          Filesize

          734B

          MD5

          60361dfd2711ba40256a8edd4873d1ed

          SHA1

          b8f70f6eb5047bc5ba282a823fcc1716ca3612f3

          SHA256

          c1d01f1d6bc9b8533eb4353523f4f8dcb3f8b394cc091a43fd8a17dd3915cd75

          SHA512

          efe542c116992bb6ef8da22ebbd055c7ed5681e23a3547730b04c66755e330c409782144cb78cd21a58f2c9ce08c66791acfe49e9702c19671ab14a5db6f62e5

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\mbglhhemeogelhjdgbbbemmjddclhbmk.crx

          Filesize

          37KB

          MD5

          7d9d627519bcd127dbe2d3b10d0dd5b5

          SHA1

          98adf921c29622fb5208bc8adaf1ced03fc72484

          SHA256

          b1709443ba564cd5b71152df680650c33738abbde8b5f71a57a3adb917830506

          SHA512

          e4e051833f84afb82d45222bda02e3722529b942d5c3480c5084c23efdbfeed2a2404252497c9b3b5ec299e92ddcbdaa5b2c9f399b34c4b250de5576ef843171

        • C:\Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\settings.ini

          Filesize

          603B

          MD5

          a0123c19bef1cbc3cc496594780dc006

          SHA1

          d36535f9dcb1ca76229533b598da6ee688d9e272

          SHA256

          61efd6826e17ffb780b7291d6ff03153747252b08ed44c253c70368859f42f43

          SHA512

          ac623c88749bc39c2ec6acfa7c6709a519a8bc02c5272b6142936ab307c3010bc4b3fe8c2928981ea2619b86efb4cfbbbfe0424c4ee52b67385efe31880a95e5

        • \Users\Admin\AppData\Local\Temp\7zS4DD2.tmp\setup.exe

          Filesize

          61KB

          MD5

          201d2311011ffdf6c762fd46cdeb52ab

          SHA1

          65c474ca42a337745e288be0e21f43ceaafd5efe

          SHA256

          15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

          SHA512

          235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b