Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 01:21

General

  • Target

    113f59a116435802d085bf18bac06953_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    113f59a116435802d085bf18bac06953

  • SHA1

    6eedf6a256d8d55e8e6873c301f8f730de11422c

  • SHA256

    71bdc986994ff0ac066342f524ec84e994ad9240bf80f97759d102e31fbf660a

  • SHA512

    6b45271fc43332062a8f96d721ec3e54f89008c96266f8df32f7590d2b83dfcef7bb3270fc8851221c5b3e3e6b4fd2f2c42d7ad4a1267c470da0d209d1b4279a

  • SSDEEP

    49152:cnt7/imwzkPs8aUmayETXRBWPRhSwn1dxL2Ve:cndPsXUlyETBBWPbr1dl

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\113f59a116435802d085bf18bac06953_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\113f59a116435802d085bf18bac06953_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\Uninstall_NSIS.exe
      C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\Uninstall_NSIS.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3032
    • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\install\Launch.exe
      C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\install\Launch.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\one\orangeinside.exe
        "C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\one\orangeinside.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\cryphooks.oi

    Filesize

    81KB

    MD5

    f87056b4ec385d68412d7a4f057d4293

    SHA1

    089e10226ca5845275f8dad9a52e52ce9d5c7be7

    SHA256

    41cf3d8d7cf69bf9e0edfe7e3962dd2b15cc11ab4d72a92af75d9f6291d215e9

    SHA512

    f0954fff3a646f513c190f716169630bb94b6da356c12c5916cab271714e16e53bb3d7ff305a97584921d75ef8cb8d964afeba3f9a278622a3f3f6d9cc3c2484

  • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\cryphooks.oi.temp

    Filesize

    81KB

    MD5

    c1a93925d9fc0c56d4ac20edc4b72c63

    SHA1

    caba2a33983a0ea48fcbba92bef28a45dc34b05c

    SHA256

    8facd033a78ecaec8d99b042a2f704bdc4a6bd8d4ee808cc0b0735355ed476bb

    SHA512

    f6ba6db75b2adbdb479bc2af3fcc270b36e674b39790ab6cfaebd0926b97d04bb99d419d16882042ca6da3548a775f43dcdde2dfb32780b1ac07300f4b831606

  • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\lang\english.dll

    Filesize

    130KB

    MD5

    ea003b02904b3c61b52bcc037e166f71

    SHA1

    effc5906a51aa2e2a569f111af1ccae289727c64

    SHA256

    1570ffd79d5d274dee81d12d55f0307c8ad2be261d59e7a9975f7f254494dacf

    SHA512

    a8ec001870d837bb06593b0c8807786d9549a430f0cf029101b7e8cfec05002a4295dded9593f166319287aba7598d21bc4392f93219ac9eb68baa7f3b1fa740

  • C:\Users\Admin\AppData\Roaming\Orange\OrangeInside\print.txt

    Filesize

    89B

    MD5

    3cdbebf5fba2bcd4e12d1552353b71c6

    SHA1

    e5796c0ad3b66aff9d3b29b708aa867baec7aa1c

    SHA256

    4ece1b5f10f841214a6c517596027d8a9abea9635c9ff926a7b33d8a94dee34a

    SHA512

    22debe335d0ea23424fafced232456320f463753c2f11c582abe79b8fc5d49a6c1437ec94f4d86e014a657aab3b1151858c1cc053b3b5933828537385cd3bec0

  • C:\Windows\SysWOW64\libcurld.dll

    Filesize

    424KB

    MD5

    3897f074eecec053c828ae72f47066cb

    SHA1

    ecc4c35bf73464e0f8c6ead599535cb6f1ff03c6

    SHA256

    98ae208fae21fa39cce9577fa3bad2883f9fd4c72ef570be500ec9ff24d4a2d3

    SHA512

    848009801b7bb4bff39206a6ae15ea3fba05113682497c921b03c4f560ff57b53165f0ed1bee034adf2f379f6f7a201960b97991c1fb32ef0bcffb25f90710a8

  • \Users\Admin\AppData\Roaming\Orange\OrangeInside\MenuOrange.dll

    Filesize

    299KB

    MD5

    b5a18af1d832237fff838778d9437465

    SHA1

    bb39cea2463749871ae5414cdaa32431245e38c2

    SHA256

    cb85eddcb8935d98b8723de463e76ec3221f20ae50abc5957d16ad3dbc0a3b4d

    SHA512

    28d1d57ee7157c9c1925bae08232d9d6a4715c7f7e6248cda995e54c2d6d2aa18e656ab42ae4596160fff6b1d94a83e7784c0cff50ad42836322544e69dce18f

  • \Users\Admin\AppData\Roaming\Orange\OrangeInside\OIExt.dll

    Filesize

    186KB

    MD5

    d597ec30e646421e6b1ec132de37b0a5

    SHA1

    72533f25c5adfe0cf0f73d928b7915c3fe9c46c9

    SHA256

    2cc91f9eb2946b2d19414ce4901668f25af5404eee717e50b179997dc80ab5b5

    SHA512

    332740d2c295e665f67f7f79cbe2130f1b473dadf8a522b2a3e46d1fd1585cd6f9fb35fcb9a13ce542eb7df14694716d5b22f16230d3ae3d97336fb0934a8a28

  • \Users\Admin\AppData\Roaming\Orange\OrangeInside\install\Launch.exe

    Filesize

    149KB

    MD5

    987ff0f9aa813dcef7379a288762a3ba

    SHA1

    1fbc51fab095fbfeaa70987ba8d6720672af7bcf

    SHA256

    f9d307793ae540de348a0ca87c77536d4074a998abc1842f33d9797ba58ee52b

    SHA512

    f3d263ce13e171697f1b8c595e5f1323c4be3151708749ab6ec68f6eb6a61c0ab66e89b5d47464784776f66f6390d70cc22a52e3aa4b6e3c8191d94a7a767820

  • \Users\Admin\AppData\Roaming\Orange\OrangeInside\one\OrangeInside.exe

    Filesize

    838KB

    MD5

    40d0ee34ee4cbdea7e211c321986a13b

    SHA1

    11d119b8f55726d31214c9258e5eb80c40a3a915

    SHA256

    56371bc125d0d9e8dc8195c5c552a3e6f725a12a9cb4af7b951ae19c63cb3c43

    SHA512

    96a8fad96d92b6b366dd22020d5910e3f66e3a311ba2eaae3dac2e8f00e7e8373b17b38df27d0218e6018a22b741b0e91c75db1e89bb34e72211bb31b4dd3d27

  • \Users\Admin\AppData\Roaming\Orange\OrangeInside\uninstall_NSIS.exe

    Filesize

    193KB

    MD5

    ef5d5d2f7561199d6f3180412f8142f2

    SHA1

    66a53ed6629d7179c45464584de70ef81f82aed0

    SHA256

    1dc870fba5f9309088728c68127fa8d208841078db9aec53ce36e019bc353bfa

    SHA512

    189afa172b9e7c42bf304a62954afe0966a0d465f8c7a691ec142ccd82f71249bc1f06864acd919bfd54416497da1e1c90075301443d9e1b25b5b2c43dd01e72