Analysis

  • max time kernel
    138s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 08:48

General

  • Target

    8579b446236c828f9225f23b772b6d37_JaffaCakes118.exe

  • Size

    313KB

  • MD5

    8579b446236c828f9225f23b772b6d37

  • SHA1

    771a89482c73c40e28dcd87f64febca57be20d46

  • SHA256

    cfa6c571858bcd6687767259bba9877b31de945be36cae50ad4b511a602c673d

  • SHA512

    357a47d993fe5c5808d65a82e5d7dca5032fee152110617e397ecac7cc334dc6d045b9f119c527dedb43ae9c5af447c323178d7a019b9684a72cabadbff5c6c8

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4stmHN1Bf9pkgs5INW48Bfxjbd6Y6BbIRu:91OgLdakmBfbdWdxXVu

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8579b446236c828f9225f23b772b6d37_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8579b446236c828f9225f23b772b6d37_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Codecv\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    81019c362bc3cb22843b7d60c35afdda

    SHA1

    5d3f48b14781aaeb12993d7472cac5f3de265929

    SHA256

    f36b6c040f4520e147ec09b93b42509eb967e0da5649e0f44cd60bd69876ef7b

    SHA512

    d00b4e124476c432e2fc4227a964d809651e13e123dd80f8f2077f592933614e3014043de337a40da267729762f1fd927cabbeab1165735ac9c91a40dbcfebad

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    3229d6d5f0711bfa97bc2db06cc32563

    SHA1

    a750fea6033c42b7b1bceca2c660e9ef0f351ab0

    SHA256

    ad63369f85d7ab9775ef675de6958589e5f88aebc34e12d9a41b8b6e5b8c2013

    SHA512

    617806423c094dc295408423e08a02ccdea16f6cc6ba7f9713368564874367f30fbc1ba669380f0a842b40f900b85a96e9984c720ddc5543c38eff6107571ef8

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    5343b6447f3f45423a7243deb14f8b94

    SHA1

    f765d2eaac07baf86f4c59f969f50f080e140390

    SHA256

    c39cdd4cdf3e770554e412eaa086a8aef9c5f458053131b678b43332c730a795

    SHA512

    68a8209fb95ad31e6ba31f56c23b0d0132bf656a41ea351958b5d249f7513d02fedc8bc6048179b3611e6e433445abc516e3e6ec7fa9ba3c0408e8f0a1a3c571

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    cdbb7d4dfff47310b1d90c7e9b2ab722

    SHA1

    d7b14b42474a134ff58aef380d6467a24d0b932d

    SHA256

    b5fe4e76565c25148d6a0d227defa21684ea13d63bbd1275f4c57ef2d670d220

    SHA512

    d7d0c429eb1b87cf99aac86f078b505af94c00914cb0ee9ad7ce6e79511667c63c5a6577f72a32182b2b2ca2807cfb94cfdf50188f2183c9d017fa539e59b5ac

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    e9262d7b3057d168f27dc6d29e2413a0

    SHA1

    e6ee90e1041829ec053af5a8702af732eed50902

    SHA256

    be03514d1031e3b9cb6cb963dc4df56529369f39f41304cddf212952682c8195

    SHA512

    a80d23a3579f613c1b26af640d15cc150ca40c42b750e1f2dc1c5da38ac3da594791db2ab57be9800a56a3573cd49732f55009f40c26f436c850a535b61e646c

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    6e9f18a7f666af6aaaa01deed1abe85c

    SHA1

    2b69e632aaa7dbf6a24d2dfb7d8449d67c516879

    SHA256

    e85f116ef896992f7de05fd4a3abfa48496bd93322fb31f8b08764a6747b853c

    SHA512

    52a2bffaac7004fc299420abcba7a887570604e49edd9fa3b104561bab04872a1880bd88627a794073055c6bacf40721aaebb45124e45b3fc2e91af3e0eefaa1

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    890376e70ee6f3bb152fcc7807c84e3e

    SHA1

    c1de5c67e79f7c9f7b58279b120094e58eb59410

    SHA256

    e3d492a88960056cce8db155e96d191b1c88e52e7ecb1b3dbab9d57609c5a653

    SHA512

    133a7de6f8917af353cbf144a1562110a92b2a56fe720b38ede1575db655f814d0494fff4f4e51f29401e272cf5d9a228762d020e39d195c176f960c143defa9

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\[email protected]\install.rdf

    Filesize

    676B

    MD5

    dc2a1f2fdcd27f24b6d9aba7a2798776

    SHA1

    d2152b8978d2f3d3244a8a9149b6f5ba1cbdc75f

    SHA256

    6c7c1b1bec74075aed0699786c86f2252a7d3ec0be648e54f1143cb2662d7162

    SHA512

    31f04db9ab71f2c97cfb05528f2dc48415e64fb980408fb2a14d157c415e68d5ae8b67ce1570465a75df0453391e02bd2e817142a6ba5b5be9f0042bbb206c5e

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\background.html

    Filesize

    5KB

    MD5

    05f1fa764bf515306a78f6ed0f0dce14

    SHA1

    0b3097e484743960baf9f0d719917d07cc273517

    SHA256

    47cd08bfc26158b55003fd9eb3177500d583df335a287cad9a8f1ee49bf036ff

    SHA512

    6b4dc7e87a43a06298d4ff7a46fec15718bbb9532141aa6ac040adc1370066df4f2ecd1079c728e9d6c85e924fff53bc6d6f4ef6ff78fe54042977e2e76180dc

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\content.js

    Filesize

    734B

    MD5

    60361dfd2711ba40256a8edd4873d1ed

    SHA1

    b8f70f6eb5047bc5ba282a823fcc1716ca3612f3

    SHA256

    c1d01f1d6bc9b8533eb4353523f4f8dcb3f8b394cc091a43fd8a17dd3915cd75

    SHA512

    efe542c116992bb6ef8da22ebbd055c7ed5681e23a3547730b04c66755e330c409782144cb78cd21a58f2c9ce08c66791acfe49e9702c19671ab14a5db6f62e5

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\mbglhhemeogelhjdgbbbemmjddclhbmk.crx

    Filesize

    37KB

    MD5

    7d9d627519bcd127dbe2d3b10d0dd5b5

    SHA1

    98adf921c29622fb5208bc8adaf1ced03fc72484

    SHA256

    b1709443ba564cd5b71152df680650c33738abbde8b5f71a57a3adb917830506

    SHA512

    e4e051833f84afb82d45222bda02e3722529b942d5c3480c5084c23efdbfeed2a2404252497c9b3b5ec299e92ddcbdaa5b2c9f399b34c4b250de5576ef843171

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\settings.ini

    Filesize

    603B

    MD5

    a0123c19bef1cbc3cc496594780dc006

    SHA1

    d36535f9dcb1ca76229533b598da6ee688d9e272

    SHA256

    61efd6826e17ffb780b7291d6ff03153747252b08ed44c253c70368859f42f43

    SHA512

    ac623c88749bc39c2ec6acfa7c6709a519a8bc02c5272b6142936ab307c3010bc4b3fe8c2928981ea2619b86efb4cfbbbfe0424c4ee52b67385efe31880a95e5

  • C:\Users\Admin\AppData\Local\Temp\7zSA0D4.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b