Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 23:52

General

  • Target

    2750941a224d5a679871b5d515260347_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    2750941a224d5a679871b5d515260347

  • SHA1

    0c6104160565234dd784f0e6316add8c776839e7

  • SHA256

    29a4dba17559f403e0b84c76ed8fb7f5ef95dfbbeea5516b2b4f243cb80a1d83

  • SHA512

    535ae3970c3e5f1ef0dcb08841cd9eee88555fe8922167e245f3c65c8263db671a324a646e3117c7bc87e86084a3d4c56d459aebae3928e2ec229a714c8555ce

  • SSDEEP

    24576:PLiY8OYczjdE6M0LecjzuNoRKVlKs1k6mBdg6qz7ZBKyDfrakDx+ybd:PLHtzpFecjEPKuDm46qz7ZBLjray+Ed

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2750941a224d5a679871b5d515260347_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2750941a224d5a679871b5d515260347_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\00294823\pqU96i02gH5.exe
      "C:\Users\Admin\AppData\Local\Temp/00294823/pqU96i02gH5.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00294823\Wq4FIR2uJG.dll

    Filesize

    258KB

    MD5

    e1d10cccd5dde588af8ee2cb7309523c

    SHA1

    0b9e805077320b0ce1e6620488bd34f1c4d7827e

    SHA256

    9900e517bfd4b39bd7af4bb360af52f6c95ef9b3e7ef36d2633485c58bef9a1a

    SHA512

    a929eaae12f5cb28e224fc31298af2808f995c5a06bc6f47d95879703dbb9369e2e35b4e50a452e91741e6a949336220348dbb3c389c46ea2e0ca41f592dcaa0

  • C:\Users\Admin\AppData\Local\Temp\00294823\Wq4FIR2uJG.tlb

    Filesize

    2KB

    MD5

    9156db5f76d48049dbc41fd1b58b3f34

    SHA1

    5eb1df59f9b5b06ab00137fc9e6451e323d3102c

    SHA256

    66fab808188a98ba49d99b723a181aa6626197d50bd2d5e15e076dcbc6fbb2cc

    SHA512

    742a77e71c34632146e16acadb6b381694072c7f4c2dea1df1dfc645ed42673ba153c832d167474dc41f9b608142a8c41b4aecda1efdab90d87d4f5c718bf149

  • C:\Users\Admin\AppData\Local\Temp\00294823\Wq4FIR2uJG.x64.dll

    Filesize

    319KB

    MD5

    4f5c722b8686afbea6f09c53171d44ca

    SHA1

    184c60aafbb12d1023b1ce2aff4d3708607a75a1

    SHA256

    870c280ea861313edda0bd3950dc738ea68d006f315888d66023b54e5f98f0ea

    SHA512

    e471a86079a16d129ea0c01878af77d1aa132e629832d3f0f3d1f8a3dd250ed41c8d2f37403a10c8061fff07c07dda926ba7ffcc417c6e0100005a0f2721417a

  • C:\Users\Admin\AppData\Local\Temp\00294823\lbplpcmkfggomedicbeghbgbmeajofci\background.html

    Filesize

    148B

    MD5

    33d10628e6442c9c7d72fb65076e0ada

    SHA1

    08b90c324b25fbe5667d32ee4befb6cb55f5e94d

    SHA256

    825ff62bdc04035f66b714cd06033af39533cf012f369a50026684355587a935

    SHA512

    c6053eb1cd59a61bb8eb5276a359abfd1c86f7d0cce01b37aa6d7c23f5a3f1bc6afdb34a5e9e178f3ea4414ca91142ee1beabb30cd45ed9589bd59c61007efef

  • C:\Users\Admin\AppData\Local\Temp\00294823\lbplpcmkfggomedicbeghbgbmeajofci\cFy69qhIlt0.js

    Filesize

    5KB

    MD5

    02f1011cfdf60935df48e3960a5823ed

    SHA1

    ebf006a4d88cebc7a4a04b61030162c7a9c6e192

    SHA256

    19cd6f1ec2d54dd2ef94368f0fcf7f727ca9cd2cd2c7595c631b3999efb46e2f

    SHA512

    ead23d113dc616f08ca0166538177fe12d6690005bb3347b9a786700d2d0eb9646647cfbfe936dcf5f5e46e9021cbf9bdece611bf30babff799ee575328a6283

  • C:\Users\Admin\AppData\Local\Temp\00294823\lbplpcmkfggomedicbeghbgbmeajofci\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\00294823\lbplpcmkfggomedicbeghbgbmeajofci\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\00294823\lbplpcmkfggomedicbeghbgbmeajofci\manifest.json

    Filesize

    512B

    MD5

    740aec56bb536c0530fe5adf57db1e32

    SHA1

    2ee57aa10fb5bf02650ca9a607812c049b9ca65f

    SHA256

    7b3b8b4f207c8320453825ee6d38bf3701b9e2b1981d4ff10073d98e00d67497

    SHA512

    53a58838a873e5176487562e51988f321eb8b073b2fd07446fd3502b00e80a6a89ef019812ba72d27c2449a174a4fb0406368181bdfd914119dd1b71408d54f1

  • C:\Users\Admin\AppData\Local\Temp\00294823\lbplpcmkfggomedicbeghbgbmeajofci\sqlite.js

    Filesize

    1KB

    MD5

    2473990f9526e7170957a94c9fc2dc4f

    SHA1

    a00fa27dd2a79125f7a1404e6dbc2f969479a40e

    SHA256

    4d423866be324e85378a2e88af6d73de1d9e5d3a9492a67d23ec60ead9ba8ceb

    SHA512

    6500b365e36a96f6bbe202bb56b911fba49ee3098935d48113efbc659f552139a6b87684f7edd0f07ddb1285d6638f77bed995c2e21400f33c70c25b8d87ade4

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    d9dd38151a7d12106e8ffec049aef213

    SHA1

    7d2dcc570c7014073d69baabcbb921d16e899e59

    SHA256

    d48f5261a50c4415acb0b987bac84dfd453d6ad880435e09e8f5a3f2f901958f

    SHA512

    da798ead3937d77215a03efdba0ac55bde4219f6e16fa55cefb25d60aaa31c9b52aaf965b48b2dcdd56e6ef65b9e17461acc9a9bffb7032c298baa04886f11d8

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    686e4ef3dcdcc39848df6c4fb7aa288d

    SHA1

    5d53f60734fc17d7259f00a9ae2aa6b3390462a5

    SHA256

    13249356903aee9d558b84686c76ff2655fb81a817917b654f6565106b2cfc4b

    SHA512

    0ee4d8de95b3585542ff01ffca357ec4099d949fb2b32ca97ddd8c1f753c6a9d58bc41a720524afbfb5f0961ee26bb59e77b8982439c5e576a7fc39d78185445

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\install.rdf

    Filesize

    614B

    MD5

    9e5c78767d33d6502c1125e3509e7bfe

    SHA1

    e99ff40b7609d908887b4ea35c4cfb88063749d2

    SHA256

    5c1505d617df31ce9ba776fea9b275e93cd6b909c1118897ae640858bac94772

    SHA512

    11b4da464f0bc600e6ab97637c2b0fe082d2a4db16e529ca05da211e47e43598d1dbd1af26fe07ca84b9b4dd5b946fcfc86c4ddebeaecc919690791041bc6141

  • C:\Users\Admin\AppData\Local\Temp\00294823\pqU96i02gH5.dat

    Filesize

    3KB

    MD5

    50566aef355afee688574d6086f38b0f

    SHA1

    092ccd270933522eff2f724616e0757fee3ac12f

    SHA256

    56679cde44a0a4b0fac8ed8b203dbbd96356b4bf85678b492dac0452df7c99c9

    SHA512

    d9b05df552745ceb3519338fb5c255a932da0c048c7599c4d7d19f59a1d1fcb48a14c053c3b1b68aa45826fc5c78b348ded8abd2a8fbe34dc340a45d6b71b0df

  • C:\Users\Admin\AppData\Local\Temp\00294823\pqU96i02gH5.exe

    Filesize

    334KB

    MD5

    8300c91b40229b42301aebc6d8859907

    SHA1

    0b55e56a6add6b4dd4ceff475a0018a203d02a5a

    SHA256

    f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

    SHA512

    0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f