Analysis

  • max time kernel
    92s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 21:26

General

  • Target

    077b6181ea045c2cfb6537885bce85d0_JaffaCakes118.exe

  • Size

    358KB

  • MD5

    077b6181ea045c2cfb6537885bce85d0

  • SHA1

    0c84ed543b5c7016515983433d47ee3a929fb12a

  • SHA256

    11f005f7b620ad4755624e9b68c26ddd36453276ea65e47a443db9944d8ebc53

  • SHA512

    06c8afad0cb209179c9905111e072b8985d244c7226f06a978e30b05aefb4271637fc3a6b187df3a74a60b828a8ea02aa3eca752766f0c3f0d58ea55a649c614

  • SSDEEP

    6144:lsv7Fs/n2XCq2iYt/g277gVslCf6tiNzzvEi+YlWSN28FSOmhJy6E2:QO/IT2jcswf6tEzzD+iXzuy6E2

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 32 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\077b6181ea045c2cfb6537885bce85d0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\077b6181ea045c2cfb6537885bce85d0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Program Files (x86)\hdvidcodec.com\FinishHDVID.exe
      FinishHDVID.exe /t=HDVidCodec
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:4508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\hdvidcodec.com\FinishHDVID.exe

          Filesize

          90KB

          MD5

          a92e7f74f3959fc86931e9be8bede75c

          SHA1

          cdb446ae3b4ce0f184cbae48fc21462524184ba9

          SHA256

          010e3485b7012a1b7d0f17d161ef44cc7abba5b0a519ac400278f4ebe640bb3b

          SHA512

          9cc779363d37b22b3b1ebd2af1ffddec039de3d9c6f81aea305fbcf6de9b9e637cb81f1a3d20da9fa854cc8d796180ebdb64ecbd58365bd740385106f81cf96d

        • C:\Program Files (x86)\hdvidcodec.com\hdvid_temp.bmp

          Filesize

          127KB

          MD5

          0fe490877ab8012f5669597c6e138498

          SHA1

          9da84e93581e088e4fd76b7f268f1cc4f1400b5e

          SHA256

          a41939a6e882334b376d5689a0ba88cc7e83cde6f42fd428b8feca492b964879

          SHA512

          46e51a8bfc7165717712a46d3a8033afe34d5581617d40d2616d78b10b44b7fdd76636c7b6391dd8a16c6ad4f7532567723e5362af01f2516ca614d688f42758

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\NSISdl.dll

          Filesize

          14KB

          MD5

          a5f8399a743ab7f9c88c645c35b1ebb5

          SHA1

          168f3c158913b0367bf79fa413357fbe97018191

          SHA256

          dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

          SHA512

          824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\accept2.bmp

          Filesize

          16KB

          MD5

          f642e8cfce23aa5d124533357de7394b

          SHA1

          80ce98a2bc4b416db357ea52a74424d742cfaa55

          SHA256

          f1bed304ea1d96094c1e4e3f8e112b7ce15af4441192e73c9144f774ad132d2e

          SHA512

          d0ec47e3a69cc6c6f54e8ba58cade7875ace43b66946e7bd4b678dc246c61acf8d36aeaf80082308f08783c28424c5db601bdde1d820f7797b60ca4fe948ad26

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\inetc3.dll

          Filesize

          25KB

          MD5

          9d8ce05f532dc7b5742831ec8a63c2d8

          SHA1

          b014365f723c78a84bcdf8a46cfa016eb2b8dbc5

          SHA256

          fcc46c2e60931a76fe529a9fa5a85ba2f4bf7907d651161f92fc524ac4747982

          SHA512

          98f268bebf0c82d019873a7b109e1822011c0532e6a6d8ba94d2b8a918d9558f4db89100b6ee357c9c510ff56adc349e619489fd7e8d21e7f826877185ede3fe

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\locate.dll

          Filesize

          17KB

          MD5

          7d3317f57c1a368480ace3c0ca804eeb

          SHA1

          d4c7e185bc64aac82339f51ba6c21cf0713c9f1a

          SHA256

          d88a04c1e39db583eaad727fd390fe599ab10198ee040bfbdd22daefadbd2372

          SHA512

          5598c2e6caa2f66edd48f8c8305e054d4b0740b5f2b7ed92cf197a13ac66ba99a32013d34b3c2e28d007ab7979eb90a50681324eb736b1410e7df1902e4ec32a

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          c10e04dd4ad4277d5adc951bb331c777

          SHA1

          b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

          SHA256

          e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

          SHA512

          853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

        • C:\Users\Admin\AppData\Local\Temp\nsyB632.tmp\nsProcess.dll

          Filesize

          4KB

          MD5

          faa7f034b38e729a983965c04cc70fc1

          SHA1

          df8bda55b498976ea47d25d8a77539b049dab55e

          SHA256

          579a034ff5ab9b732a318b1636c2902840f604e8e664f5b93c07a99253b3c9cf

          SHA512

          7868f9b437fcf829ad993ff57995f58836ad578458994361c72ae1bf1dfb74022f9f9e948b48afd3361ed3426c4f85b4bb0d595e38ee278fee5c4425c4491dbf