Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 17:13

General

  • Target

    f67a72843d3e038106a9aa87db79bfc5_JaffaCakes118.exe

  • Size

    313KB

  • MD5

    f67a72843d3e038106a9aa87db79bfc5

  • SHA1

    28ad8df17409733cd3e65705dab5209ed3299665

  • SHA256

    265da6b32b2bcd6cda4f1fcf7dc66a94ab67f72c865643212199cef1d50185c9

  • SHA512

    02057d432bb98ef6e95a489617a1d78af395afb9d4746304aace0c4201205a3d2175cb6b7f8c9794622b20f7ac10a92f7adcc952d40c151296baf3f5ec66e1c0

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sHATKGQnSM6AZ8PKei+Vz5mR5dcE01PH:91OgLdajJMF8PKeiitmx+PH

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f67a72843d3e038106a9aa87db79bfc5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f67a72843d3e038106a9aa87db79bfc5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Bcool\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    bb9ef9d9aa1da8e5d4235cc2f7a99b3c

    SHA1

    9737a5d663612deb377eca0d77aad927f308e261

    SHA256

    50f5d9064d3fc86b7926f336129359f2ae686d812041b0122edc631fdb72a0fc

    SHA512

    8734ea11ee6f1cda50155768c1e7cadb35e037de50b303b45d2ffe65cc970ae645d8124b3bb28c3f4726fc61208dc20477d98bb92cea24d45a0efaf1e3c566f1

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    e2cb6b10803b38fdc1cb47a3cebe10d9

    SHA1

    d6e28782eb06fc21b8a03ead86a9ce91efe09dff

    SHA256

    d4ace8f1bf306b608465991548fca9de22e53489b8ee00d7bbc0e21acac870f9

    SHA512

    e8f09ee9f16a83cdba995c03566c7ab119c936b620798a3b4851289fcf641cd845e067da13848541ed64219b35ac4a640c3efbe4820f7d99b7c759e4cba97771

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    45c9ada0b021050bffb07d22ed37455d

    SHA1

    12025f45b97992f5a2e1ae53169a467fc99b071d

    SHA256

    db593dc330b87e0f5eedd3c3f87113f90561b1fa1447e5c59e912bd848615ef8

    SHA512

    34cdbe959601a5eaa0ad03d38670e7371a081f8c50cf6daf8b393c299c9f505ca9a9ce0d34c4a69c0379508467627267e3d46c583cd530b1464acfefa9fcf9ff

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    ecc5c9a93263b4beee32e312bf29bb78

    SHA1

    061fb1c2cf39acd14bf0a778e2acb73e40169bed

    SHA256

    3cfabf716297831b421fa671114ea022938fdd765809878281b0c0765be51c99

    SHA512

    4a60aad288e0e9b91d04904a73e57fd0141d388f8849b2aac4db1b2cf5648445c02227f9d6df86f4b84fd50f0a23bcb6f5a64ac54e6f382aee40bf80c3393970

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    0ae38051d3e6c609121c15ccce4d3619

    SHA1

    6b46f5bee73470567491f172338f440dc8f8f007

    SHA256

    4b280933cc5b146b04d5473baf0dcacfe8035b8a5e6d541b97c43a64605ea712

    SHA512

    82d3b9c4578821df6d6717767c7e34d5c6e53e489d8980327f8a58cda896340411f9abadb51edb46232bb25708842094f044adc633f26b08fb44156790a8983f

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    6572d48a3bacd70fc10620bef887119c

    SHA1

    302c7e53375ff766e3c35461eed8ccd268127217

    SHA256

    e6f50ac0de9f45be8a69f79ca374f4a828550b8b6ce248485cecafb6f80dab77

    SHA512

    c86e3ffc1bea921119f287f71610cbe946dd94d262e34f6336ee3767e406116eb57a8681d3c0ee7d2be9de75852648941a5e3efb120a7508a84133c417624a50

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    cbbe4f376dd95cba946d07d04bcc5dcd

    SHA1

    1891984474bc8928ef9bda10aff89888828deacc

    SHA256

    19cfbfb042ceb4bb735225e032361dd9470825c57a2cffede156bcf45dd716fd

    SHA512

    bad4074e1db96f35f7cb8791b180e04e01e1ec1c14cc7a15b3026c4d76740d37be280f8760167772f28bb2cbf5ae84c9cb9b4b96a6939e7bfa1d1c9f39c29d01

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\[email protected]\install.rdf

    Filesize

    668B

    MD5

    a49ae0067c5a960f44d864344f915e03

    SHA1

    d4cff8c469ad0a73588dceed2e04d6fe12d2ef54

    SHA256

    6834fb3b8b9a59ace87d70dedfdcd62eabfa29eb015bae099df107c8da9284c6

    SHA512

    399030cae965830ce88c04b7a5ac4fef143a14cbe99dac5a7291b0c20969577e8337b6b8cb9cdec3545ded280f5d9134db5de6d44d333b1ab284a94459846382

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\background.html

    Filesize

    4KB

    MD5

    39c1e6215917b5502f4f42ffc0725b44

    SHA1

    47b6da403448dba03cdf79325a65da682cc73b81

    SHA256

    2b8ff1b6150da5a63e821f61d5b8499ffecc1295a94daf81729d4a8e9bab4108

    SHA512

    3fa1327a505f5570ce0ffa2bdd01033601e93053e3d7ec9ce462b73bc624d3ab763f005d44863008b41fefb0e3ddf402bc2a1a42c5d61cf1f0d15345e2b8ff3d

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\content.js

    Filesize

    387B

    MD5

    0c94e4376c9d32e0f6141799c1c5da46

    SHA1

    852645d33d90b2db807aa98f7aa86f438da1cdb3

    SHA256

    f051a2d0678e2dd651b4b110f9118027d1d52ca6ec2a814584d4e20944c32319

    SHA512

    2dd46ad735362dfed99e9ddcf0d99fb9b4ad2dd4c2112c8074caecc22b2d90ae8d908f56b5a23784948557e96c9000f17955caca98a37bc2f9cbbece08802ef1

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\mmhhdkmeoobponnejcelpgmfheomblfl.crx

    Filesize

    37KB

    MD5

    55cc8bb9634ef2a17165bbcd716674a1

    SHA1

    c5365b79d38e9120414953550c2eb2d6ae44e28d

    SHA256

    f53a399f98aa43fc19a06bbe54dd8c7be2b4721c9f1318a0c9b45b75b97d59f8

    SHA512

    761d04df67b353852e8b8d8125d869972f04c9a8a29848a92bc608d77f5c9377ab56ddbe3aa1dca4ed165fa4c57caf6489c38fe2c511c2ff30cd94bdd8ba5d79

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\settings.ini

    Filesize

    593B

    MD5

    c0635f4c2e5f92435a168a23fd474c08

    SHA1

    316dc5277a9b75cfade09aa525f6ddd89f19bc61

    SHA256

    a2c3eecbcd6f5b7d928574c2e3d4093f7a952638bd216ba711987bc1143bc24b

    SHA512

    7e177974716a7ec87a828ab81be59bd817f7afa5d4340c816153f510fefced830c7fb705250c1cc5206bf0126f4879c1b1fad9676019392706e7c0b83c16cc2d

  • C:\Users\Admin\AppData\Local\Temp\7zS879F.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b