Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 17:51

General

  • Target

    a7a07e12f383f56a1c77d863f235e8b6_JaffaCakes118.exe

  • Size

    251KB

  • MD5

    a7a07e12f383f56a1c77d863f235e8b6

  • SHA1

    0887ad1a9c556192e48e92474eca9a3c5edfd395

  • SHA256

    6f668c4099f1640bf211420543264281095044fd94fcaec0b7dac2cb6c409ecf

  • SHA512

    63bc69ed2758c4b0cbec87bb15301e7ba08dbd7acd1f54990444711d78143b76eeee7726556ed7cfa52455327dd3690d8102b848f99b4f2f951552ddd7e822a0

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4suibNsq9mtSAOUn:91OgLdazibNycGn

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a07e12f383f56a1c77d863f235e8b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a07e12f383f56a1c77d863f235e8b6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADDICT-THING\uninstall.exe

    Filesize

    46KB

    MD5

    8be20144dbd200c6de0c9430ed9280cf

    SHA1

    b81e3aacaaedd66ef0896acabc6983c94758e2b4

    SHA256

    634557ab79a29fe800721bc5f146a9b86799b72eb6755e821492f85ca66818a6

    SHA512

    fd7db954002be6332c8c6f4500fc38c1d5286022bb56f21b97567e837ee3d5a3c6db08cabcd2ffe405e7180918d6bb0b57b330703a9d045851901d01115ff94e

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    f0ded83c97e0190109bc35e59c3a86a3

    SHA1

    8ba0d099b3ae07ed479f45000f422f78a579254f

    SHA256

    9301e5cd5c9018835f5656cdbc01e62968d2cdc305f4230fdd2b12e256463484

    SHA512

    6a437fc06c2db07568606e8a9561f51e6d038d8afb2c05608167e42c5c134290d96a8be80851b01175e579f07685dc49ac1921f497f2f384670ccb24a1cbbb52

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    643b2ac5111510e8f2b0cab0f16fa38d

    SHA1

    252a4595060731079d4c1f57db016dc4e6f54768

    SHA256

    c59a99b93391185d9cdb37a9010f95cfc7c6b3ed92aceee66a61575b54d784db

    SHA512

    ca9905492db1bb3d4b8c2b849a2cb6734c20d419478cf53eafa6e1ff4aa9b2b02276f054bd5e4d31a609ca14284a7b5356395d313c609226c82e54f616bd07d9

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    a3af277fd2f5595b86c816657c0e9f15

    SHA1

    2e63be03e6b7cecea66550563ae29793f06536cf

    SHA256

    850c1f83e6b2d3541f52e67bad00ef015400c9a348a62aae2d9bbbffab59fd8c

    SHA512

    f2b64b87250b560848f37447b8184ffcaea374e75f60a0538eecda93974009b6d1782e7a12b048f8ee0e42a788569fa258caebcdf31a93afc206796362382619

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    d019e2d76c1e6adbdd4116ea2ec010ba

    SHA1

    5bc3a88cb1827e7240ddf239acadb729bac2d844

    SHA256

    8223840d49f1348754c6da69f987fd4556f9f9a9980a9dfae6c4896f4c001f94

    SHA512

    1b6c0eebcc7f48b6a65b9a657f367c8e0244f30984f5661a0b5904a6c07fe78de29468bc711a4e136cc613f17f150354f487f610c2b56266f88939b95c4b9415

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\[email protected]\install.rdf

    Filesize

    714B

    MD5

    a6a649d3bfb3dccf106264dd83cf9f31

    SHA1

    c862bb9f8d2f08e9e51e6c98c37f2a97536557ee

    SHA256

    7d5ccce9a9d1dbf276f7cf7f7072f1c7a354ef55c6dad46ef8322fe9cec6704c

    SHA512

    e82d31f23b8d0b2f16bcd5d4118446df8a8b4551640d27664b0a6c360f1e6502204bffcde6bc75a5fde5b3390528eeff50dabe55a1cfa8d86fd9d6cf5cf5a60f

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\background.html

    Filesize

    4KB

    MD5

    6566a47a76707774bc390b17eb1f393d

    SHA1

    42d791579cc0dffe535abdbdbbd2beca489cd81f

    SHA256

    fb63adf1343a594cc6e0d9eb708be2fba9cb7d8c474fae26ef4a731c49b0e0e2

    SHA512

    8ac3cb33fc5f218361f550dfec55a68aedeb1320394ea0e5d127efe14607a8ffd718c302cf8f91200803232229e90b55ed33b8904389664f4d0dc609f81b123d

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\content.js

    Filesize

    388B

    MD5

    230873b3e26beeabab1ad7b1b05a5332

    SHA1

    25b4fa02de74dc12e3ce01e7e2691911af0e157a

    SHA256

    47461770edd7107133ee92b610297bc66a8314d8fb909853ee3ae3d389fbd011

    SHA512

    dae3ad9433caf8185a0514a8b186a6c37a0ee79cf2f2b3e573dcfe8ea028eb324182883ca1670c51ad4cc1cf576abd983809f61adf7ace4caba4b87ca344ddae

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\mmpbafaggdlpaglefgpcjlhencbhhada.crx

    Filesize

    3KB

    MD5

    e738dbf567cd313c558c224f45d3770e

    SHA1

    e7528f990906225d11bb633ecfd3cc90512480b7

    SHA256

    bc598feff45ea804cefcc12a8479d08ec0d6621df76ad7deddb953bc9b664bd9

    SHA512

    b838897609b22705f9c8a814bf0722c20c67d29be96734fc402ee20d624a17972cc2120cb3e42f691cf3bb69a1206742a0c36b3a1a72a3dc3ef60085ecc13b99

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\settings.ini

    Filesize

    667B

    MD5

    f8616e5a20a2f67c34469aceaee3f39c

    SHA1

    3d71125c30aa69514f6f15b4e1318e35bcfdec31

    SHA256

    680943683a793b6556630c95caa35d8cb08ab861a7b28ba90305b9328520f233

    SHA512

    f8463f93e04b888a532f55eb95e604ca68db68ee2569b482b8311274c72506c7ebd24fc12790b334405c2418bb26282e32732c2d211e6820b4a62a1657d4a799

  • C:\Users\Admin\AppData\Local\Temp\7zSBCD8.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059