Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 06:10

General

  • Target

    12278517fed6a96e9e436d3546067284_JaffaCakes118.exe

  • Size

    550KB

  • MD5

    12278517fed6a96e9e436d3546067284

  • SHA1

    9be07c09dbdaee783b32626d00917860dcff2b2c

  • SHA256

    d7a501f0d1286bfa47c1501612f5193482e909d3e9d609ea0577ee9ab0f92724

  • SHA512

    ed6727acf23560d6259a64e70fdc77d58460808693b0db0e553f0455930e1ce28a0f6b40834c093c8126716bcb60fe3646c111149c6b59fe1479da538f05b96c

  • SSDEEP

    12288:h1OgLdaO1Wctn+MEfOUgbJuMmFcouJqkd:h1OYdaO1tMOUgJHJJqkd

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12278517fed6a96e9e436d3546067284_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\12278517fed6a96e9e436d3546067284_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /n /s /i:"" Qt03S0.dll
      2⤵
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\6Y0pvB.dll

    Filesize

    180KB

    MD5

    0e093772550eb9541dd715c016b5584a

    SHA1

    20338dc859a5652f5661280dc508f4e5b533e76d

    SHA256

    028999304f35f7a6fc2cf6e360d4ea587612d63ce191fa979cc98ccca46ab149

    SHA512

    0030b395e2fde6bc9f70f52e71d8e87d306cff8afd2acbad725c4cc92b6d7916a38c1d6d156feaec841966492d32394982ef51989e2b8673d7c00e103f744dd5

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\6Y0pvB.tlb

    Filesize

    2KB

    MD5

    48e9706fe9f76731f3576122fc3e9e33

    SHA1

    387c8c4898ead8ace488a7df80fead429eaf167b

    SHA256

    7bad79916803a14ca817e5c39f5ec2f0f240044d6dc24fb4916c8fda338060f1

    SHA512

    e9b44a2b1b7a806066182a084ec9df81916fc6db79710256e173377e7cd64a732c006830bbe324a9a734731ecde8b8251cfa995399f6d4df5322faff99c458b6

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\Preferences.C__Users_Admin_AppData_Local_Google_Chrome_User Data_Default_Preferences

    Filesize

    4KB

    MD5

    46c0134f54a4a91f6d2c3dba2bc5faa5

    SHA1

    c534b9fa1f6677b47d145a29656828bd8db5651a

    SHA256

    d5d5dea26b5480ff9ddd711b771bc5ca4bc2e0d65ca6a99ece76d201f428f730

    SHA512

    bbb7856f2de1a0c71a7cdcd17c470fbdc05cb5f7616e54adc5c42c876172e7d8b2a1469680a7ef1e5c2237ca1865db3432ea1c9cf20e61dcc1b08e578e4cf790

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\Qt03S0.dll

    Filesize

    203KB

    MD5

    41b13b132cb601ecc466654b90296353

    SHA1

    245258ddccb48826f22d57444f49fa30be1b36fd

    SHA256

    7fa4bb68c313e1090587a64b90e87bdcbc14ea3fb7c0e8cff94c657c969b70bf

    SHA512

    0e8de7bbe3695848e299fe3f3506f2e982a60cf0a0dd11cde86de4af67ef3c7b46458680d7bad9cedaa266ea33cb2e77f2aa83fcf1bdd20bf31d1936f2bd69a6

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\lklfcgnhcehlifkkmboggooihhdplnga\background.html

    Filesize

    144B

    MD5

    080d6ef1c06393ff08423508452ddbd6

    SHA1

    3224b9737498e41ba9020ab5029733e6cb291067

    SHA256

    93af26ae6caf546e9ba628af746881d7dfc3ae0981f6b823251d4ff0097726f4

    SHA512

    5ad9c80fd0ae86f8801d5dd3f42f9e9eb0269506b1462804e58ee50fc3faa9b11fc7ee174dbb75b966e22b1f25031344aa305dc2c94c594dc3ddcc068dcd6e18

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\lklfcgnhcehlifkkmboggooihhdplnga\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\lklfcgnhcehlifkkmboggooihhdplnga\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\lklfcgnhcehlifkkmboggooihhdplnga\manifest.json

    Filesize

    499B

    MD5

    4c4bad19f3514e843f38a49ed67c9126

    SHA1

    bbb1b10f73992a749c51c447678676a18849fab4

    SHA256

    c7d4e356cc5de4755833d581a7b0092d7259ed2bb172ca195bc23f8e504eefae

    SHA512

    050533fc10b26f027f990248b27f738ed182a8c42b8b9a898e66cd0fb4ef382cc94ae47eb027bbf8eaf1912b61b9c21798a15dd7be4431c89779e6f3eaeedfcf

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\lklfcgnhcehlifkkmboggooihhdplnga\si3aUKN.js

    Filesize

    4KB

    MD5

    53ef2389dd1dbcd87646511f1adb9228

    SHA1

    329407dd6dcab08eb23809c6d8840eb80e7104b1

    SHA256

    42618630bb50c8d80541e96d5ef0a36e7922e8bee46797560c9e42b3798e3692

    SHA512

    331ba5a6b36c10f802b2f0c5de66c984f91e17c89e7884a1e5c256ddbc032bfb2d9d8de5a40bd76fe026eccea44a75068d729cd282b286ed9ce5c4bcf1007765

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\lklfcgnhcehlifkkmboggooihhdplnga\sqlite.js

    Filesize

    1KB

    MD5

    4eb9807c42a0d9109fe58df66ec05915

    SHA1

    4b9d3d44efcb7c9d342479f88c4bcfad52da2849

    SHA256

    4121d82cf6b74df3b03d24ced49fa68143981c7b6db6c0bd13216e4de1f39dd2

    SHA512

    ee1adde478b5f2b84a470b4413f8c7f71947c880251275c518f0cebaafd7363fc11c3fb6557ec46b0701788264d23d5d1ceb8d2dc64c8cacab8532d8e3254def

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\settings.ini

    Filesize

    7KB

    MD5

    c025bddddbfb3a867c583ae59009b875

    SHA1

    72c19de248189dc1e437635d97369002d1a2fe3d

    SHA256

    033994ea1a8aca39ad1eaab3ff2a94851ed49333a50e0a1f198c1c116175ecba

    SHA512

    91a3c31a6716d17deecf29322399937957e1f1a9c9b97975d0e35f655148e63fd54a03c7af2cc2ee6373b29469d907835e9e4fd93526cb9611b44d67518b6c7f

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    769adf1979a6b249426b8b09a265ed25

    SHA1

    efac877c0fbe7f84a60cce82470a7c9b7e41acb7

    SHA256

    efe8274acca289d5d1365f048e656ac6150af4cd908aa57929acb0a724bbba0e

    SHA512

    d591c0461c1bc331b2c87cad128ba76a5576cf8ad094914b51b50b58274a3a1aaddba90cf5325814343fddbfdd87a2ca69f4a0e1b5e240f0b2fcf2aeb4f9cee0

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\[email protected]\chrome.manifest

    Filesize

    106B

    MD5

    851714df8461e3f02346c48782a6996d

    SHA1

    6419631f2d6de3c8ea8ceb741af489de867ceef1

    SHA256

    05a31419cbd5809ef835e1802e8f93e97a6369562c934e591cd6462c908d1931

    SHA512

    c26e45705e1a93fcfebc7e78a9b8be62846962a14b7511258f4fa18e7a6dfd1cf24e1d7fec4541be6fa7941baf131ac220af6ac0bb2a5cfbe2c8cf364dfc3b65

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    4bb33ec0fb6a517b7547b410a19ad030

    SHA1

    ecd8560391b4fa31f5060637c52df685782efc2a

    SHA256

    26a0d53b76a854a844306b780c550bb1a394ccba3d91612ec049046565b37ab4

    SHA512

    69df4574bd598fd6f3ef7767f92ff009f6cf1562194670b8c5952b23a3217487e277feac89197b9c59456d8eea36172c3900e677ca63155a979148aa7dda0a7b

  • C:\Users\Admin\AppData\Local\Temp\7zSBF2.tmp\[email protected]\install.rdf

    Filesize

    604B

    MD5

    3864c0d2a9ad3b0dc6d1cdc976eefa3e

    SHA1

    94be55b40e86649d85c002a7bc5f0df3fa28be8d

    SHA256

    ac89c7f898dfd1b1e1addc60a343e0746302d05195e0bd668633cea40fa4a28b

    SHA512

    d86fd33f6d620bd7bcd9b654a5a71d80d3013a58a4051f9b9f02dde3e59a04397dc48d5080d9d55ed7dbf61833c509b21db965413add8d859229ec81e24725ba