Overview
overview
7Static
static
3bc0c44357c...18.exe
windows7-x64
7bc0c44357c...18.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PROGRAMFI...R1.dll
windows7-x64
6$PROGRAMFI...R1.dll
windows10-2004-x64
6Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/Mozilla Firefox/$R1.dll
Resource
win7-20240705-en
General
-
Target
bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
bc0c44357c2dd5683406f6523f65590e
-
SHA1
29eea060fca71efac3aecb7962c51d66e83b2e93
-
SHA256
31a1553ca7cb23f86e5e841596311e489c7c5285b4ac49d4fe655a918f2a5723
-
SHA512
68dad1bfe9260ed7b3d7d3fe4beea1ba766ad944a4a95be24968405b38e970c45c089ca5de9633dd63c9727e2cacfedeeb559bbbf50d8cfb75587b0fd7f3a8a1
-
SSDEEP
24576:p1hV44mXVPitJFvB8ezCLEvmskrM5GVD/wKRaWdGX4IK9FwnkPr8m2NBMUO:DrFmXV68IkA5GD4Lort8/o
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 3256 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe 3256 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe 3256 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe 3256 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe 3256 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe 3256 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3b4546e-beb3-115e-8779-3f8997b07305} bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3b4546e-beb3-115e-8779-3f8997b07305}\NoExplorer = "0" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\f6b41f6b.dll bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe File created C:\Windows\SysWOW64\16b9b0dc.exe bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c3b4546e-beb3-115e-8779-3f8997b07305} bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c3b4546e-beb3-115e-8779-3f8997b07305}\ = "sleekseek" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c3b4546e-beb3-115e-8779-3f8997b07305}\InProcServer32 bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c3b4546e-beb3-115e-8779-3f8997b07305}\InProcServer32\ = "C:\\Windows\\SysWow64\\f6b41f6b.dll" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c3b4546e-beb3-115e-8779-3f8997b07305}\InProcServer32\ThreadingModel = "Apartment" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\\{a55d6f08-4937-41fb-68b1-64ab01161712} bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a55d6f08-4937-41fb-68b1-64ab01161712}\1080008765 = "Ã“í¥¡»£”¼•\u00a0¼Á”¾\u00a0ö" bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc0c44357c2dd5683406f6523f65590e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
17KB
MD588ad3fd90fc52ac3ee0441a38400a384
SHA108bc9e1f5951b54126b5c3c769e3eaed42f3d10b
SHA256e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42
SHA512359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb
-
Filesize
1.9MB
MD5c57bfc1c24b16df571bf0a90124aabf0
SHA132ab3c366bc32dc3ddc88c42eea70a4739f2e3c4
SHA2568a1cc850e65e92b960f33c999fcd2452f08899a8bf94f0f51e6cf03775cb403e
SHA51293e9918561235b22c5b276ba7454b8e7f3f09f35742d5766d7a81db20ff0f62e562a989eab2e32a517b12b4fb344436bfb97e2d7f6d0d950950bfd2d497edf1b