Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 08:13

General

  • Target

    0ebc355b7576859c71696e3be9775610_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    0ebc355b7576859c71696e3be9775610

  • SHA1

    79034814a2f7c3fc8468b5817a569447f85ec631

  • SHA256

    c16a6e29e9c0e13f29cb75dbc5e8c6e4278ab669941778babf907f741872a467

  • SHA512

    ce89b3596e0f40546948bb7996cf88daa6b081d6720225c315cc3eaf6129bdf981f4c41b2fa3e7f26412190d4c33db214b4e7354ba4b57753e7c08735da8f807

  • SSDEEP

    24576:h1OYdaOoOBsFEt5hDG0SAMs9jR/jaJnTJdwY68+UhnWb3aQe:h1OsdOEt5hDG0SAMs9j8nTJ2Y68hWGQe

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ebc355b7576859c71696e3be9775610_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ebc355b7576859c71696e3be9775610_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\28O25U9zOU.exe
      .\28O25U9zOU.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\1592541378.log

    Filesize

    3KB

    MD5

    6da8bb6f160c14d8e70003779015dc4b

    SHA1

    8eebf571739c27670a7723f00d273e580bf67fb2

    SHA256

    d29cab19da5b9a87af1204aa6d98e6413138c5747b45d05a85f5125157847198

    SHA512

    57103276cc621d403edbd818234f069576a135d9d0b541197999af31a6ea5815befd2fefb8a91a12742a9edfe197af69088c0bfbc86e9407243d9aacea0baf81

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\28O25U9zOU.dat

    Filesize

    5KB

    MD5

    f38d43f61e76fc39e44a179b299da97d

    SHA1

    f6d45ae6d01a6bd84346594e532c0408fd1a6efa

    SHA256

    f07048ffc696ff403f5f2f128c735c855c244e39344f84219f8e9f743126db2a

    SHA512

    27461134715791d00261092dcd05911d570001011384caf34f5f28905739350fa4f6d702756cbc72532e39a806d57f5fe66d6343b893592fd42fb3710f4e7e51

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\EaXk4iWjq.dll

    Filesize

    258KB

    MD5

    e1d10cccd5dde588af8ee2cb7309523c

    SHA1

    0b9e805077320b0ce1e6620488bd34f1c4d7827e

    SHA256

    9900e517bfd4b39bd7af4bb360af52f6c95ef9b3e7ef36d2633485c58bef9a1a

    SHA512

    a929eaae12f5cb28e224fc31298af2808f995c5a06bc6f47d95879703dbb9369e2e35b4e50a452e91741e6a949336220348dbb3c389c46ea2e0ca41f592dcaa0

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\EaXk4iWjq.tlb

    Filesize

    2KB

    MD5

    9156db5f76d48049dbc41fd1b58b3f34

    SHA1

    5eb1df59f9b5b06ab00137fc9e6451e323d3102c

    SHA256

    66fab808188a98ba49d99b723a181aa6626197d50bd2d5e15e076dcbc6fbb2cc

    SHA512

    742a77e71c34632146e16acadb6b381694072c7f4c2dea1df1dfc645ed42673ba153c832d167474dc41f9b608142a8c41b4aecda1efdab90d87d4f5c718bf149

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\EaXk4iWjq.x64.dll

    Filesize

    319KB

    MD5

    4f5c722b8686afbea6f09c53171d44ca

    SHA1

    184c60aafbb12d1023b1ce2aff4d3708607a75a1

    SHA256

    870c280ea861313edda0bd3950dc738ea68d006f315888d66023b54e5f98f0ea

    SHA512

    e471a86079a16d129ea0c01878af77d1aa132e629832d3f0f3d1f8a3dd250ed41c8d2f37403a10c8061fff07c07dda926ba7ffcc417c6e0100005a0f2721417a

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\[email protected]\chrome.manifest

    Filesize

    112B

    MD5

    436617c88ceef5ce3fd573e0972d4ab7

    SHA1

    054d078c4cc19aa40cf9ca4929ae48a667a8d326

    SHA256

    9ed1e331b67cfe1443def05eaa657124ab2c653233d46998885be241ade17444

    SHA512

    7bd969f89f21006b35d1f71282dd97b072f7f1b8db316e26c18ef69f78fdddbdca7f22e564278fd72d3232381b6c23595aac316f170f6c2135f751369f246ee6

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    89c86c92b5d1bf1e94892786c75ca002

    SHA1

    c01403117300bca61a58571d1429ce40ec0aebb2

    SHA256

    72a2b66d297d630970bdb77c0a84bd640ba0e4f8a10c177892ee935454d88669

    SHA512

    cb6cc6602f9518699f2350cf2c57d2038ea857f61da1c0338f4d56c1c87536000063a4b5d08fdf50ece401dc3d9c847fc3b95269442344a3188e4ef5d393ce0c

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\[email protected]\install.rdf

    Filesize

    607B

    MD5

    0d2fafa4b822ac0ec1cc08302e9ba92d

    SHA1

    40f91b44a804e877fc5807f688b7ea34bb130d83

    SHA256

    7279d8a6d7b8a8737dff5b8bb9453b7c24df10e36889b7ed95ae16de1d7ece78

    SHA512

    b20e3c8acdebd998e740693b33c929fad32ccf94f0f4d7d73c5afa99e0c4fe3e8ff2bd967f625a63c11627f8cae72fde572d09acd35e87e312f6139e485203f4

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\fbfadcijhgphaocembllidoonkabifnn\background.html

    Filesize

    147B

    MD5

    7bceaf0105d2bfeafbf5396a627a9fce

    SHA1

    497015138d68d461a2710876f7a6b15790654c7c

    SHA256

    dc54ad7737e1c235b7d67fa6673ecb932f036e8d9c0b435b1851bc99213c1ba7

    SHA512

    575b096db527fb877c3aac7632bf8df6c4b12937eacdacc0682808c2fd83ff8009fdd035b1ba8e00e46aee1930ee2e3f07b7d6bf708545ee53d0dd2b53bf59aa

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\fbfadcijhgphaocembllidoonkabifnn\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\fbfadcijhgphaocembllidoonkabifnn\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\fbfadcijhgphaocembllidoonkabifnn\manifest.json

    Filesize

    504B

    MD5

    fd8c59ad3932102cace469938ac10464

    SHA1

    ad3671bda6c8a455f70905d864b12fef0ed3d5b4

    SHA256

    0ed424e1bda240f1d5b06ca30b49b25c50bdff1304138c6dfbb0b50c30a17d89

    SHA512

    8a89fe0ab156b3cb8e973b0407226b4563cd3f9d0b022de9fdef3085ed040b9616f4053f739bf3f7efdb392122f2a05524cc1a754716e136515bdede30eb03d2

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\fbfadcijhgphaocembllidoonkabifnn\sqlite.js

    Filesize

    1KB

    MD5

    782cd7e7e3152555dfdd8cd4889f05c4

    SHA1

    1a5ee060b61039963cf3a2d7b71aa1c1f4969d90

    SHA256

    387a127d72a6076c5ccbad1f7b515872f4c80fe9bdff31c5ccdb65c1f376ea07

    SHA512

    39751a86a689dfdd432a300a13ca99fa229af625026fa4c27bbd9c716ff6cb492d0a510f5c1df95360af4609f6a4c69a0dd4676eccb818c04eb79c89a7a995f7

  • C:\Users\Admin\AppData\Local\Temp\7zSF161.tmp\fbfadcijhgphaocembllidoonkabifnn\xTVIsJWOBZ.js

    Filesize

    5KB

    MD5

    1193351fe32c0b57f51831b46609c563

    SHA1

    9192f2309a6975418b0b0f6ccc2a9030980f6970

    SHA256

    3363d5de039b3fe6f2ea8c27ff74e2e76cb092d9355ac6a5010bda5333347625

    SHA512

    af6f3c756126159a4ace9f793c9810357d7fcbe07f2458a9f6de0830f18c5c8639509cd58d5b8448456bfc62ff01061eab955bde276b1fe802fd4f4a45bca577

  • \Users\Admin\AppData\Local\Temp\7zSF161.tmp\28O25U9zOU.exe

    Filesize

    334KB

    MD5

    8300c91b40229b42301aebc6d8859907

    SHA1

    0b55e56a6add6b4dd4ceff475a0018a203d02a5a

    SHA256

    f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

    SHA512

    0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f