Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 14:06

General

  • Target

    8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    8aa7a85b0e8635673ad8f29b51643316

  • SHA1

    44009dcd589a87f689a201e962f76f7c44acb694

  • SHA256

    3a1c2c4f7306122d9cc9000d2a0290671214f168f5813d9e8a4bb0f19cf5ff92

  • SHA512

    4b5f3a08f6d060ccacf81e4ed66626865a4a5093064c3319a31164036014323fa46635b93054153ce04bb6ecf1189f1e7b8c6cd45830a080010c570b59652c24

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sW0BMnO2olfhEf0hBQ:91OgLdaXQM1e5Ewa

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8aa7a85b0e8635673ad8f29b51643316_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDfast\uninstall.exe

    Filesize

    46KB

    MD5

    8be20144dbd200c6de0c9430ed9280cf

    SHA1

    b81e3aacaaedd66ef0896acabc6983c94758e2b4

    SHA256

    634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6

    SHA512

    fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    45ef3fd7a0a271a25309e3e53ff89021

    SHA1

    62c9c7630d31acd60f03dd3c0276cc1edf98a8fc

    SHA256

    ebab0953e71a77d5a6f87f1cdb39a6df3a15d87756514960c71b81c7a6ff19a3

    SHA512

    020c0872ac02db63ec36b2dd992647f9beed33c59679b91228a6b133908444acb04a8d86f2a1622c435235f65e43a61bfb18a4a4e5f0ad53b2b30f02a33771b4

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    0c56c89075dea8b026206639f5d640f8

    SHA1

    c6dc859e4e94271ec7c67ff84d406916d46aecf2

    SHA256

    3afc44159f000b37ce0420bf495e623136edc2aea4e099741e848cd8fdc62749

    SHA512

    8efaf7f547110f62b880cd9d2dec309cdd8b84fae46d9a247479e13a08b5616e807b52e774ff6ab0a1cd171f1d3ec6253e2dd5ab4d9ce1f149bcd2f80bc69617

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    295242210b0b383d96af27d9c96a45ca

    SHA1

    857dfa2cb30ee315545e02bd3645cba152edd73a

    SHA256

    a3bc59b8739ecfc3ab06330957d4f9caf89fd292bd46e3c257eaeb477c028903

    SHA512

    451d8071ceeb7abe6c34316577bd8c5169548e4a64b045130d5e74454b57cd9e002ea5de26d9b7674379d155de0329c101b0b77030f27deb24dd242c6d224730

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    f4dc015292658b6c2f71253ea3915542

    SHA1

    c840db59eddcded24c6d1c8f0568fd2fa6778f87

    SHA256

    1cd34568f9fdb5e46777f6545c0278f2c258b61e17970f030ec7a0038e4a1bce

    SHA512

    e8b62b9ab05b445f24b71fdefcb8070ea9d2f9efcc4dc4b62af64bc1fd1c38737767ca25affee2f1714c22973b5691cade62d5d0f2b5311cea42909ccacbab3e

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\[email protected]\install.rdf

    Filesize

    714B

    MD5

    787b9228dbadfe26ca13a2ed2d6eb023

    SHA1

    79bf0c08353ca53bb667d3308e64feb69a3f01b8

    SHA256

    78de170388ace399be286fcb0b886da4f081a656312714befb8f498bf468de39

    SHA512

    545879328c3d21abf4cdee70e01fec6015d7b65e0e7beaf7ce460b31aad448dc73330c6dab49a10ca8705a8894c48653ca110f8958c2b27deb7b57a8bb9cbac0

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\background.html

    Filesize

    4KB

    MD5

    20dc347c38318ac686d0ccfca0b495a3

    SHA1

    314b30731d305a0bde6a5116348173ca8d565e41

    SHA256

    89fc71c7cad6d73cacc5946789134644c5ba4d16900d963fea3a687a569e8b7d

    SHA512

    c2a91bc7072547f110a514eda68a5cbe618ec606784448a43769b94767c227383cdf3d1b7c9d623e93228f2e2e026003ea6977308c90afc7d9201689195ae8e0

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\content.js

    Filesize

    391B

    MD5

    b0aea84419477a53cd44819bd1673629

    SHA1

    8cfeda42e2e078abd9f2d8b16550738c6426c4ce

    SHA256

    6bddd07e79b030ff0a9832604f24d62158f248420606b16517e72cf7bd05acd3

    SHA512

    88d67df212e2b8d8cbc8d3f1c9f75cef6e296117f6bebc21f16f6134f87a2488d58a9e79996b846a8ed34162cffc47292e108a765dfb51fff92c77f479230a61

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\fmmoiibpmgddomhlkecbceddjpggdilj.crx

    Filesize

    3KB

    MD5

    6e0b8fdca3d9c9ff0580261b9fd96f7a

    SHA1

    0ca36d05abbacceecb01f151d50dc8d24ae7dec9

    SHA256

    1d7c449dccff8896ca33e42e9194720ea88cf988e1dde98936339c3d3d1c6a4a

    SHA512

    f8e117d6efa4b881db832b68a534aa9d04af74cddbade5b966c468ae16245c835763115c743530fccb10e7cf83fb8ae06f0c9f65cd888d3f31e2fea4894ec969

  • C:\Users\Admin\AppData\Local\Temp\7zS7197.tmp\settings.ini

    Filesize

    660B

    MD5

    596e845edbb6e4455a24f374d5b2e298

    SHA1

    80e252f99f9d8ffa3ccd44af17d22503954bf785

    SHA256

    d5dc5175972cdaf89fb6522345974cbfdd1e295985670d5bde54784a7d8c2514

    SHA512

    244e39910d9349f0719f5f78d1fbfa5b0b6c859b271cc9564fa59be50e65ff6905a65f0d66178d607e0a0aa146ff9c86bd367ca48cfba02d4a35f15fc594228e

  • \Users\Admin\AppData\Local\Temp\7zS7197.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059