Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 16:43

General

  • Target

    0b9f5c827c3e51a6fdaa8cbd496a97a0_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    0b9f5c827c3e51a6fdaa8cbd496a97a0

  • SHA1

    3f4997113dace261b0dd3fc84fda6dfb92a73004

  • SHA256

    ee3e21a8e918e97afc29be6bce207a8c1b62b9fc5d5f42592b391adaba7c9b16

  • SHA512

    8e2cd0125a12ff1b7c8fee4d52687e1d57488858ca7119a0593d8965eb01c00a471f5271e24fee3ca606138f2cb3b1fcb24a39819deac5bd01608944e0d70de5

  • SSDEEP

    24576:4LiVMJs0+22rBJdFSaHwdaduUwbpYLd0POEbbGiVB1KJhtEQ/qb:4Lzs0+lr3dFLHwiwUYCyOhWb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b9f5c827c3e51a6fdaa8cbd496a97a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b9f5c827c3e51a6fdaa8cbd496a97a0_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Users\Admin\AppData\Local\Temp\00294823\fXmzBCwLP.exe
      "C:\Users\Admin\AppData\Local\Temp/00294823/fXmzBCwLP.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:3520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00294823\8uuHsuBx.dll

    Filesize

    258KB

    MD5

    e1d10cccd5dde588af8ee2cb7309523c

    SHA1

    0b9e805077320b0ce1e6620488bd34f1c4d7827e

    SHA256

    9900e517bfd4b39bd7af4bb360af52f6c95ef9b3e7ef36d2633485c58bef9a1a

    SHA512

    a929eaae12f5cb28e224fc31298af2808f995c5a06bc6f47d95879703dbb9369e2e35b4e50a452e91741e6a949336220348dbb3c389c46ea2e0ca41f592dcaa0

  • C:\Users\Admin\AppData\Local\Temp\00294823\8uuHsuBx.tlb

    Filesize

    2KB

    MD5

    9156db5f76d48049dbc41fd1b58b3f34

    SHA1

    5eb1df59f9b5b06ab00137fc9e6451e323d3102c

    SHA256

    66fab808188a98ba49d99b723a181aa6626197d50bd2d5e15e076dcbc6fbb2cc

    SHA512

    742a77e71c34632146e16acadb6b381694072c7f4c2dea1df1dfc645ed42673ba153c832d167474dc41f9b608142a8c41b4aecda1efdab90d87d4f5c718bf149

  • C:\Users\Admin\AppData\Local\Temp\00294823\8uuHsuBx.x64.dll

    Filesize

    319KB

    MD5

    4f5c722b8686afbea6f09c53171d44ca

    SHA1

    184c60aafbb12d1023b1ce2aff4d3708607a75a1

    SHA256

    870c280ea861313edda0bd3950dc738ea68d006f315888d66023b54e5f98f0ea

    SHA512

    e471a86079a16d129ea0c01878af77d1aa132e629832d3f0f3d1f8a3dd250ed41c8d2f37403a10c8061fff07c07dda926ba7ffcc417c6e0100005a0f2721417a

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\chrome.manifest

    Filesize

    110B

    MD5

    488f756566312057ad63ea8ad24fc9a4

    SHA1

    77085d1f12932932326e731e8c9244ae5c2dc8f4

    SHA256

    a9d9393f1113eec2b1007d4a6f2dfa998b7186f70e68e20e52d9839430affb81

    SHA512

    1330253d66ebe1a364c2fbce1e62bceb812da15021feb421a76afc28f5bc5db7d2bffe953a96f9df439d16435854f363b5484e0affbd0ad37479aec2f969ca31

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    62f363048c7201cf24575730236608d4

    SHA1

    b3110b5a775ea91b9da1a1d5a00bcc541d5f8cc3

    SHA256

    63b829eb12a11fe98b9bcda6a866a024da601f1610008ded16c2e74f52aef869

    SHA512

    23230b6b6e8df8addbb02b2f59819c3b79a0f0a30da362bb9e29c1af16a81071aa26d97bfef0e2eb296a0c231f85bf21e36c37a77242a270170aafcc1cb0a8ae

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\install.rdf

    Filesize

    610B

    MD5

    e793ea90f2e70db98d667891f6838008

    SHA1

    39a6579fb64a756be51f6c6bb5de43f73eb6c8d3

    SHA256

    3773aefdfb447e94b1a0a40fc21885a4dedc1a9d0ed65e623819eb87cce8ac6f

    SHA512

    8340eddb1fe536f0fd649251b4557725bf32ef338c4f6d1ccaad791e9bb7e4c47b3659e382bc494a0124ecc0c7771a3b6d94981adc2426f8831595d80f947496

  • C:\Users\Admin\AppData\Local\Temp\00294823\fXmzBCwLP.dat

    Filesize

    3KB

    MD5

    09a033ce8be7bf87a812cc5a1532b279

    SHA1

    5aba39d29ab8fcdf1feaa120ba4cd81d8f01d2ac

    SHA256

    81590345852f10a0e05de4b94a3c3f5ae95ccc2a33ae480fa45667b573996a7a

    SHA512

    9cf335fad3bda0653ba7ff7fff07624e0fbd63bbec77a417b9786ad211aed925b0e66e009376ae9909e30de79b2ae6e92968ce976eccb98293686311b12b74bc

  • C:\Users\Admin\AppData\Local\Temp\00294823\fXmzBCwLP.exe

    Filesize

    334KB

    MD5

    8300c91b40229b42301aebc6d8859907

    SHA1

    0b55e56a6add6b4dd4ceff475a0018a203d02a5a

    SHA256

    f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

    SHA512

    0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f

  • C:\Users\Admin\AppData\Local\Temp\00294823\ipbopdiobiccdocommbmlkfhimpbmmjb\background.html

    Filesize

    146B

    MD5

    73e12332603b25177a1ff45ffa6bf548

    SHA1

    896b84a9751fc45528dcc2360f346f2eb5f90edc

    SHA256

    f7dc3b569fc6a3e9f56793db6f007f3813b2c3952a833a55d6b053b06245f5e3

    SHA512

    701cae1f0565aac02dcb0352645b0fcb32a1e77b02184ae95b48eaf3d54e0ebb31f1e8f76ec53e1cdf33fa20d3557e4da95458886bb52d0837f619b2127fdca1

  • C:\Users\Admin\AppData\Local\Temp\00294823\ipbopdiobiccdocommbmlkfhimpbmmjb\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\00294823\ipbopdiobiccdocommbmlkfhimpbmmjb\jlhG5qN4n.js

    Filesize

    5KB

    MD5

    a7e9195488fcf63219c59663c1e4ce67

    SHA1

    fa9497634347f801d5852f22734e5533fc58190d

    SHA256

    52846695ca5e9e803af734b5d1e53d5caab35af34cbd6e23ae1eddec1aa59bfe

    SHA512

    ce755893e8bfca33481abe2defce96d7a5fc56796a3129d35f575cbf4587139fa363dff68fcda98cf8d2848bf95c0a8059a42cef15d004b15395eaa7e395a1c0

  • C:\Users\Admin\AppData\Local\Temp\00294823\ipbopdiobiccdocommbmlkfhimpbmmjb\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\00294823\ipbopdiobiccdocommbmlkfhimpbmmjb\manifest.json

    Filesize

    508B

    MD5

    f4d7064715212aeea587581acd75f72a

    SHA1

    60fb538b8c91e79508ff99e671aadb9b165784a9

    SHA256

    9b5d3e7a98508daf9422487ed6c19ea19851737e9d0b9369159c61b45d4670df

    SHA512

    3fd5f1baf83a0fc4129fbce14453d27efe9764860903e7acfaecec41161777b312b6c99ba755693e5787ea354f940baec028680cf4ca5e081e1b443743dffc13

  • C:\Users\Admin\AppData\Local\Temp\00294823\ipbopdiobiccdocommbmlkfhimpbmmjb\sqlite.js

    Filesize

    1KB

    MD5

    729cb4aa68c30536a6c9a3e5aa391947

    SHA1

    3f6cc9f604a5ab0551b3bf2c2720c00ceeb282b7

    SHA256

    8a2660eca5844aaef53c65336d3e55e962b12d3c38b244f187185bbe2ef78d37

    SHA512

    262abad403e5628a6bedb70351b8e72cfacecf768e123c62e592b203427807502a53a990bd536528a610ae18faff3a62ef9730a903d402c5554e00d0a7b22a55