Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 22:17

General

  • Target

    07a5643e72fc220e3e2419850af461a1_JaffaCakes118.exe

  • Size

    2.9MB

  • MD5

    07a5643e72fc220e3e2419850af461a1

  • SHA1

    c50837178bd7d4807d522df816a2d801636b0d35

  • SHA256

    963480a52d930ff04c6921ebcc1cee7d766463a3a38f7f385eb85e42e340dfca

  • SHA512

    9a5c5e256c702f6ed0a4d8323fefb138e335a2c8fb822727bf7fc0e68151d9ff58a2a2801ec5b84a85c434392b3550dda0d883fe5032415b2b6a54958d71b85c

  • SSDEEP

    49152:R9T5L5Hrr0f7uziwZ5E1uHW8gRHSTdA54rTUm/sP7g9zMbjfFOe5fskzCq4ebA5n:7T5lrtiwTYuHW8gh625YxGM9ktV5fR+P

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07a5643e72fc220e3e2419850af461a1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07a5643e72fc220e3e2419850af461a1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\is-19EVB.tmp\07a5643e72fc220e3e2419850af461a1_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-19EVB.tmp\07a5643e72fc220e3e2419850af461a1_JaffaCakes118.tmp" /SL5="$40152,2428727,70144,C:\Users\Admin\AppData\Local\Temp\07a5643e72fc220e3e2419850af461a1_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Program Files (x86)\Crawler Toolbar\Crawler.exe
        "C:\Program Files (x86)\Crawler Toolbar\Crawler.exe" /regserver
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2396
      • C:\Program Files (x86)\Crawler Toolbar\Crawler.exe
        "C:\Program Files (x86)\Crawler Toolbar\Crawler.exe" /install
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:340
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Crawler Toolbar\Crawler.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1348
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Crawler Toolbar\Crawler64.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1740
      • C:\Program Files (x86)\Crawler Toolbar\Crawler.exe
        "C:\Program Files (x86)\Crawler Toolbar\Crawler.exe" /afterinstall
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        PID:2216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Crawler Toolbar\Buttons\WSG.xml

          Filesize

          3KB

          MD5

          c3c4014bc922100408e25799cb298f5a

          SHA1

          9c74fbb24f189bf40d01fc4f6acd206663e24a8b

          SHA256

          f0fd5504e1966fc31371ee6289819bfb3b0561220e5d3e106274ed40e4611a9b

          SHA512

          4d93d258654f7cfe12702f486580b50bc8aace75a63a465e3166c8d51e6af40b0021954c68ea8bda63c16ea8f7244837f0e8cf4d3425f0edd1083f995bb8bd22

        • C:\Program Files (x86)\Crawler Toolbar\Buttons\capricot_green.xml

          Filesize

          53KB

          MD5

          99936e1644e6df80d80da53cc1bf37ff

          SHA1

          5b7269aa31366ec9345e8334afa5db45c397271e

          SHA256

          feeaf83ee9ed52d3119a893ec409b958264bef64e2e78791e342afbf8699e212

          SHA512

          19b17baa2deb974da1cd86090099e80c3a7e197f2131dbd750b41f5d476af0d24a066697ab9e4dd497af734c28d603832c1ac01e8d4f8a5c56ee035ba71d4fe5

        • C:\Program Files (x86)\Crawler Toolbar\Buttons\mail_crawler_plugin.xml

          Filesize

          7KB

          MD5

          dc7693a39d6164894818d1875927caf3

          SHA1

          07c6b3e47c3c6fd0c81e296bed4788d151d6ad49

          SHA256

          3ec384cf1270946fbf07efbf52d7ee51bc4d9e6c6242e0425419a142343bd09f

          SHA512

          1e79337fb7429b0c4c0e7d8ce31e0079d6c3b2b881d8d22ac2713af5cfd283d9c7a156961621113a08a53e4f64cfae00e9bc0b7a771ebb79d3e8780fc84e822c

        • C:\Program Files (x86)\Crawler Toolbar\Buttons\maps_crawler_search.xml

          Filesize

          5KB

          MD5

          01044ddde125c0d592877fedc13dd21e

          SHA1

          cbab569393c78735711ad3cce8995eb83a12ac52

          SHA256

          7afc82e3ee115a5cb809d20dab5ec3117fcaa8a59bed254776264895bafb23a1

          SHA512

          f5308e140ed4c62a46d31a2c7b577666ab8897857830eb93cdd93f970afc2e2585f587f4a9553accc65b9119ddd1176ec26624c82ba1916d7fbf6ceb64dd5b16

        • C:\Program Files (x86)\Crawler Toolbar\Buttons\maps_crawler_weather_plugin.xml

          Filesize

          5KB

          MD5

          5b541fa1a499f55c674f54684ab259f1

          SHA1

          7f88e7cd18b0071eeef261dd6de365055236d7ac

          SHA256

          d1c96cabb3d31a6ce470f42d618f00c8c365ab5c5e6ee5c2fdfce6f6d4d56c3f

          SHA512

          3fba0483cb9050abf10189789dcd8955eaf80cce331b58a298fad48cd8e2a71edeb63944af37909ca3884a295e0c5f57c1b0fcc7ea590891f4c8ff7826386312

        • C:\Program Files (x86)\Crawler Toolbar\Crawler.dll

          Filesize

          1.1MB

          MD5

          895a94d52cefa40d0870ecbe426e5584

          SHA1

          91bd4203bdfbe0c05ef001b66e8b025789398306

          SHA256

          5b049ecc3fe7e9929a3727050dc702da2b2933a87d3718701fdd71e2968ee4c9

          SHA512

          ae7ca6be41678406fd17e3d938a5e46cedbab89b45c557cb31b0e82636b28990d758543abfa5e015511e3af81120bceff2d62b3bbb09de101c8b9fe6b9bab764

        • C:\Program Files (x86)\Crawler Toolbar\Crawler.ini

          Filesize

          2KB

          MD5

          c9fee062c46e928824c3c65e23bff1cb

          SHA1

          8a6220ae814f9342aed001018c0bc4ee2be99c63

          SHA256

          35d3a3183ce4536d03e6d199f59f2dd16c8abbffef63fd86bd95612f5da0c016

          SHA512

          85dac6ce4e1ebb1a232e1543025fc5af95a00b9c5c0964c3906e146fff6751934fb1540506d43400c06f37857a7bee231ed5eeec5681ecd1b70ab9d61276c0a7

        • C:\Program Files (x86)\Crawler Toolbar\Crawler.ini

          Filesize

          2KB

          MD5

          f6b1c9b2d68f761e6e7a9e1d39317bd8

          SHA1

          ffbe1d705b3e098d6b6fa58a8f0ebec004644d6f

          SHA256

          06c3fecae872739ca0ce76499303aef4466373ecc831def1475ab75f3ab51cc5

          SHA512

          af558cfc27d71b6c29284304739d17cf9b93fc51bd0766882603e9f8b3c6fd34a1553a3d225eabe48c6f36bf41cc4dfcd02733bb0d816040c4ff8b7fc8f66105

        • C:\Program Files (x86)\Crawler Toolbar\Crawler64.dll

          Filesize

          1.7MB

          MD5

          14eaae8ef6f7140ea22b97eedbc75c8c

          SHA1

          6e579b66c8ad6f7601dc90daf4043b5161cd9359

          SHA256

          fcb2ab323da45f37b87a079ae157b28ab81d9337486adeeb82e95d2cac9f467e

          SHA512

          192a851caaf664954f81977c5c50a8abf6f68715bf2bc43cab601614fdf04f08958b5bcb28652640809e971053c42bede66e296e07e8e76ad34a650b868f6c37

        • C:\Program Files (x86)\Crawler Toolbar\Plugins\cmail.dll

          Filesize

          1.2MB

          MD5

          73bc873f4160a171707d3234137ba41e

          SHA1

          0a9fb37052371d254417057a7c529165a35480c8

          SHA256

          6a5d5d0bbec9017999abc418aac8b1c598349211ef68cc437fb543ae315d997d

          SHA512

          c75f4886083f1aabaa406e7db6fa810205276abf9628b261e04bd2c8869411c97194b9584634b5fadbd592b7c1fdaf472356593f8a1448d23dea5b08f083aae9

        • C:\Program Files (x86)\Crawler Toolbar\Plugins\cwsg.dll

          Filesize

          1.1MB

          MD5

          f9a279fe16cdb8589920c7d656492eb5

          SHA1

          92f0aba125f64fd8c6c806589de370cfa4ee99ca

          SHA256

          66d1466598680c040ab77c2b0b4f6103c5312bac9bfafe36cc06e50cca5e15e6

          SHA512

          7a9cb7fab33deb6788cfb8a0ff0981de0bda84669e6b68e94f76dbdca5741e3298636e486fd53425209e149755b6388b4360d59eaca61795970de2b4fd6fce72

        • C:\Users\Admin\AppData\LocalLow\Crawler Toolbar\config.ini

          Filesize

          33B

          MD5

          94df3a23fe8cf65900e1c39b026e622d

          SHA1

          f104a6ed5342baca7edc04430fae8f73c67812f2

          SHA256

          9ff2cbe505b42f3aab2868d68daf3d988bbdc1679e317bb9ddbe83e038c32b54

          SHA512

          9fc59ed1b70bbabef770b52cd86795138b53f26178b42e9a707fd645047c9db3f545a06656b68a7f1accef5ccf3d798f96e6d7ea2e7fd61fa6d452a452724816

        • C:\Users\Admin\AppData\LocalLow\Crawler Toolbar\translate.ini

          Filesize

          88KB

          MD5

          e8f04e949fb2a72e460e516099ff8557

          SHA1

          16379d4ec586ff6b2cfff0b26702acd58bd84e55

          SHA256

          9fecf907284921e59b52a61ec87427935be03124fcef6659230368eb085fde9f

          SHA512

          6a3dff5f661524e5e044a2ac5f213301af893d78240796649f3a7fbcd26674afbd8d48959e199573b097b11e75d670782ced7df08f50ab0fcab36436f0851d6f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{A26C36F3-9D6C-4551-86A4-B3E9C4B7B3CD}.ico

          Filesize

          3KB

          MD5

          cf8d44b5052a584c5957d737c0d1ff0e

          SHA1

          457490e9904a57560c6d443a69ca3cfe7b6df82e

          SHA256

          f1038cc916ffdcdc48122269805595e9a838c4421c134ee2dc9fd9f44f3e6779

          SHA512

          5a321f79c27b5d82133fe5577020a5b2679fdc4568802afb7b642c3fca64c8f968e819926171f99c6d130e279bf48d099398386cba3b4fce71b28145c946b97f

        • C:\Users\Admin\AppData\Local\Temp\CabE275.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarE297.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\is-UH974.tmp\RI_AfterDot.bmp

          Filesize

          84B

          MD5

          7ccd5a0af4da51cf4962f184fcf9456a

          SHA1

          de37f4521fa7fee49b37898f4136728e8971ee0f

          SHA256

          8f2374b30622dfae1fd0b9706520de34c5e1597c1531fddbff65bc0201132ac7

          SHA512

          d7c4fbc6a4413dc457400fa2e026dea5d639a5b413164cc6939284c46bb46b6ae8ff10184ba2da4f32ace89646b026400db2a49dd9894d71e88d003a91c8267a

        • C:\Users\Admin\AppData\Local\Temp\is-UH974.tmp\setupcfg.ini

          Filesize

          44B

          MD5

          e7a597bce7865e79e4ac4260a8f71444

          SHA1

          b503a8c6a5dc0f17820a1519369c0f501d670882

          SHA256

          2643df6fe5ce9676be43604926ecbbe15e19162cdb3815fd1228036e87bfcade

          SHA512

          67b98d967aee9eec3396ecb5388a3bdcfc5adcaa01be354d5d7c6568b9df189b4893acd2e854d9be9cbe3b48029173e0dca984e07e681af48244dac859f77f58

        • C:\Users\Admin\AppData\Local\Temp\is-UH974.tmp\tbr_dots.bmp

          Filesize

          164B

          MD5

          adc799ec79eeaef366ea4dddf099c3ae

          SHA1

          556c915615a34a2499604b7b732ab304b20fdd4e

          SHA256

          7e7f18c73560f9c020abe1ab1f22705083281e2ea16ab0030fc927901b5b5d1e

          SHA512

          76962a17cc26d3f9886828be4e43373ac530165e1c627272ed7c0bc731133e97608e55d2e31f44592aad0d0974352155f41a0718aa0666ec128406b1050c1d6c

        • \Program Files (x86)\Crawler Toolbar\Crawler.exe

          Filesize

          1.3MB

          MD5

          9d5457c2c663f41e72be62909a6c5f65

          SHA1

          c0c439fd86b1823a2f9f63d54fb1e2e555170114

          SHA256

          d73fe164b1abd3106da1eaf23983053abac8f199ef0dc29206043d2c4764c7c0

          SHA512

          fee8106d384970ae82e04a6fd3769eb5467f0e6644aa8e445fdcf6ca0d8c137d25e1f124b52ae97082432e98f37f659c8d779e95875e08d766663e363e0aa551

        • \Users\Admin\AppData\Local\Temp\is-19EVB.tmp\07a5643e72fc220e3e2419850af461a1_JaffaCakes118.tmp

          Filesize

          1.2MB

          MD5

          e7106fbf42fbc6d5b08a18ada4f781b4

          SHA1

          36d4a629f79d772c0b0df8bd2ae2ea09108d239d

          SHA256

          64e1f1fa7d91920b17bc7bc679a4cd8d87ff5b104318b6921bb6bf6a19055635

          SHA512

          adf876296a952aadeb4f25211c0939bf5a278809b5d3007ad7e26c5d4975e7684d242c1b3de796efd474a47cb7ecdb80f9047935924a1108bf0e4d7c973d1845

        • \Users\Admin\AppData\Local\Temp\is-UH974.tmp\DownLib.dll

          Filesize

          183KB

          MD5

          db25dfdd4c1f2b65c68a230881072695

          SHA1

          94cd6a3438041f0e61b0a1bea7b66461854efe69

          SHA256

          1b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73

          SHA512

          db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c

        • \Users\Admin\AppData\Local\Temp\is-UH974.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • memory/340-197-0x00000000037D0000-0x000000000390E000-memory.dmp

          Filesize

          1.2MB

        • memory/340-271-0x0000000000400000-0x0000000000559000-memory.dmp

          Filesize

          1.3MB

        • memory/340-287-0x0000000000400000-0x0000000000559000-memory.dmp

          Filesize

          1.3MB

        • memory/340-219-0x00000000037D0000-0x00000000038F4000-memory.dmp

          Filesize

          1.1MB

        • memory/1348-226-0x0000000000B20000-0x0000000000C48000-memory.dmp

          Filesize

          1.2MB

        • memory/1740-229-0x0000000001EF0000-0x00000000020A6000-memory.dmp

          Filesize

          1.7MB

        • memory/2216-276-0x0000000000400000-0x0000000000559000-memory.dmp

          Filesize

          1.3MB

        • memory/2216-368-0x0000000000400000-0x0000000000559000-memory.dmp

          Filesize

          1.3MB

        • memory/2336-365-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2336-9-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2336-274-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-275-0x0000000006490000-0x00000000065B8000-memory.dmp

          Filesize

          1.2MB

        • memory/2336-273-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2336-22-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-406-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-386-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-224-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2336-396-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-391-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-232-0x0000000006490000-0x00000000065B8000-memory.dmp

          Filesize

          1.2MB

        • memory/2336-223-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2336-376-0x0000000003AD0000-0x0000000003B07000-memory.dmp

          Filesize

          220KB

        • memory/2396-172-0x0000000000400000-0x0000000000559000-memory.dmp

          Filesize

          1.3MB

        • memory/2908-0-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2908-2-0x0000000000401000-0x000000000040D000-memory.dmp

          Filesize

          48KB

        • memory/2908-221-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB