Analysis

  • max time kernel
    131s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 16:37

General

  • Target

    1421700495a595b342eabe8de952a419_JaffaCakes118.exe

  • Size

    255KB

  • MD5

    1421700495a595b342eabe8de952a419

  • SHA1

    93a81e8a5ee0efaa2c0bb4cdb961eb0368d90b0c

  • SHA256

    00a3d4d46632a06ca35cf13b64b1b6324e7b0fe6960db562e89128884468c900

  • SHA512

    628d8baa0360274d2ab4fb74095cae3d2268b8b31b2e6d199c6ebee32a55585d424fa023ac682ecd4114a40aab51f01a3113642b404166440d55391a5fd6dc4d

  • SSDEEP

    3072:hn1/uEAgDPdkBlyFZ+ScjaiKWbETBquAEXlqsUUhMUnpiPqERIFJZcrT2Bk7MDu6:h1OgDPdkBAFZWjadD4s55hERLuLChw

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1421700495a595b342eabe8de952a419_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1421700495a595b342eabe8de952a419_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\51e10ddd02354.exe
      .\51e10ddd02354.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:4124
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4360,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
    1⤵
      PID:3620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\saafe asaave\uninstall.exe

      Filesize

      48KB

      MD5

      f3c79bda3fdf7c5dd24d60400a57cadb

      SHA1

      1adb606aaeedb246a371c8877c737f0f8c798625

      SHA256

      a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

      SHA512

      c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\51e10ddd02354.exe

      Filesize

      71KB

      MD5

      b78633fae8aaf5f7e99e9c736f44f9c5

      SHA1

      26fc60e29c459891ac0909470ac6c61a1eca1544

      SHA256

      d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

      SHA512

      3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\51e10ddd0238d.dll

      Filesize

      116KB

      MD5

      05234975b085632d70d89c2f420c5107

      SHA1

      078fb2a3e5de54c3737a4541242a4725c02c6b9c

      SHA256

      a758ad4fdc8949ea005258075457a972eb0672d69d98d688117b85221fca096a

      SHA512

      f9fa6aee142e32875127feadebbe235f4f376b0c3b7415036b8afc81c0a09a8ba0c5ec9e1703f1a34b220b7646caa1ca02629918185c4afbafe6926014044c4e

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\51e10ddd0238d.tlb

      Filesize

      18KB

      MD5

      c1e296ff01d3cf37f91c7473bdd9de52

      SHA1

      832e3d1ddeb5a0ceb5b13c1ee271eb94bf9bf2a6

      SHA256

      a8e54ad3e1fbc91d5a7b02bf177a24a02f2558419ce46859bf15859b81478492

      SHA512

      aeb1f3962746caa3858c27b4753959d5ec9db2727e94642d5db2710633a96e7ceef5f9c0ff3b358f83143b6594459b5d9a94e095fed7a5d1fa97ae6a3c4e564c

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\51e10ddd0217d7.20004303.js

      Filesize

      4KB

      MD5

      35adce88c87531c25e590973329c26c0

      SHA1

      cf127bcef50c988a5c1db0788ec68904b81c8c57

      SHA256

      dead6cf420d066337b64d8ff0081202aa5f776fa7b62853f04e5423e1b05dfd3

      SHA512

      eff370657110bf72e71b6e181c35060627836de71945b21bc54a8a98b0101a092681d471ca08195d112022c408b9441600dec4342438f55c3f5e507c2f996335

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\background.html

      Filesize

      161B

      MD5

      d4acad085ca4f373e44846e3b63f67d6

      SHA1

      942ebea46b2ebc1732e884cde0b9dd9f79a3c7d9

      SHA256

      1f86abfdca2138b71aa7df0b2e32b5f50e53591d2288392997cf33f42b0229ec

      SHA512

      75f8426c0e25be58a44aada39e5e137f90d928a11af61ff059935db654b6d064ed2bd278512b7504a73c0442e7c72cd902a17f35b8cac69cfb58bc39478356e9

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\content.js

      Filesize

      197B

      MD5

      5f9891607f65f433b0690bae7088b2c1

      SHA1

      b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

      SHA256

      fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

      SHA512

      76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\lsdb.js

      Filesize

      559B

      MD5

      209b7ae0b6d8c3f9687c979d03b08089

      SHA1

      6449f8bff917115eef4e7488fae61942a869200f

      SHA256

      e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

      SHA512

      1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\manifest.json

      Filesize

      504B

      MD5

      81c0747c1079a3d8c98568565b1874e2

      SHA1

      c792d52b988a87b7505386acc8ff58e12e0e4c8b

      SHA256

      4b7e3c90cf446cb8d22b0ab181cd37686459ede5b0c0b2593d2663ad5d159cfc

      SHA512

      b5adb6d35b756c97758f160c1018e510991a82d48dd61ab0db597d25d4af0c5e79f81338c3a0283dc2cf583a524861ee8818efbae6242e76aa619d54029faa6f

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\kogpkpaagpkiefdlnhmebbmmnoklclfd\sqlite.js

      Filesize

      1KB

      MD5

      d8ebefd42fa96e62b47f3ee79b4b2264

      SHA1

      2da8bce715efe3ae0418826bcdfedbfd75aff86c

      SHA256

      7f77c262ff12f2d682ad374d58af06ced7966643b9498612691e6f2badf5c8e2

      SHA512

      822650c250d78a404d0519bdacc04d8d3febdc551a4a0c055b61520373fa09dfcc5e132acff88ec70f8a3133adbaaf100bf5f61d88cda9277489b1e31c938dda

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\settings.ini

      Filesize

      6KB

      MD5

      5b155d6298b055f77b0ee5c277c42074

      SHA1

      23a04a86db65ef20f198ad36011d1d91d55a4fb7

      SHA256

      2511ac8976f01e75f5f04b0163ff53f2f89124fd4806ffbf5ca701052d10070a

      SHA512

      cc5050d816c899a175114111c00c70756f3868d8f625402ead183ac8cc35c9842cb28ed93c19263b6af6cd02008db1ce0a0295d1340abf1c99854725f9964819

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\[email protected]\bootstrap.js

      Filesize

      2KB

      MD5

      5d42a430536051aa88d5f1450c0caab1

      SHA1

      71297eb09ade8e0a48e8ca59c976c3a9aa0e1269

      SHA256

      b9de3041a9cff45ba0041ed3b4cd88e9d5e4f38b548b1cd03efa72b4395bf6a7

      SHA512

      a3803f6a4b525319b8b4b0848cc353380a65bf5f12f63bc146b9364e8ceb1a7600af70463429850f3804ce77571f1e100d29929e72ba45c157b2bbbb3ba1670d

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\[email protected]\chrome.manifest

      Filesize

      116B

      MD5

      e8903ad56c9608c0eff3ff0cdfbdf498

      SHA1

      fb685e4af6f11ed503c62f1c00bd3f2b2ef2d888

      SHA256

      19a705dbb3cb77753cdba82ca0773977bc1f2931c5d449371cfe660eb870df3f

      SHA512

      68242dd5dd682380f377168cece951934f3f3e61e731cfc46a51fe626197069189cfbfed1e961843a52613cfd2b6f24f59ca1a944c237d91320f4e8ffdb871d8

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\[email protected]\content\bg.js

      Filesize

      8KB

      MD5

      10861e6e50b54782c753305cada34f4c

      SHA1

      87c71a69e199123410aee60cb92fbf5dc6683345

      SHA256

      6d503ce20e4a058c24b7295664131ecf9a8f85784dcacca93748e8d3ac0cf47e

      SHA512

      d129051e3e9b87a3b5017fb9fea07bb46353d063a7506124c00a454d58c95b01e330efcb4f98c2f03a440c338d62cf032fd375afc7fdc8d5a8678831a3c9a93b

    • C:\Users\Admin\AppData\Local\Temp\7zS5A31.tmp\[email protected]\install.rdf

      Filesize

      601B

      MD5

      d74b9512fb31cf7acbd145a48fb8891a

      SHA1

      d450f3f1768b3e8d9ec79545d0302c6ea7102774

      SHA256

      1703b2ad7418f04787bb16f84cd2c309aff51ef007a85140028428a99cbfab77

      SHA512

      f522cad385927eb6b502bd3801926b9aaebc12904c7de11a1d65c0d97ee9d0a2722977808d289218706d2dd4fcdd5732640ca295c736ed2766daae7c94c44bc8

    • C:\Users\Admin\AppData\Local\Temp\nso5B4B.tmp\UserInfo.dll

      Filesize

      4KB

      MD5

      7579ade7ae1747a31960a228ce02e666

      SHA1

      8ec8571a296737e819dcf86353a43fcf8ec63351

      SHA256

      564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

      SHA512

      a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

    • C:\Users\Admin\AppData\Local\Temp\nso5B4B.tmp\nsJSON.dll

      Filesize

      7KB

      MD5

      b9cd1b0fd3af89892348e5cc3108dce7

      SHA1

      f7bc59bf631303facfc970c0da67a73568e1dca6

      SHA256

      49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

      SHA512

      fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

    • memory/4124-73-0x0000000074B70000-0x0000000074B7A000-memory.dmp

      Filesize

      40KB