Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 00:20

General

  • Target

    279f160fa72fc360880bb2200feba630_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    279f160fa72fc360880bb2200feba630

  • SHA1

    d5cec6c53e5b07eec307639b64a83766272e7925

  • SHA256

    ac10945174ef4bc81a4103f74b9e54c5fbf2e105a9d65b7eb6c55c8f72494b5b

  • SHA512

    06dad3dab5303d54db14ee1147ef86710ccb9ff67938cbab4ba25eb002bf1c3f13f8b65f695116821e5b6c8d1618753ea773fc4bd37861c1dff1ccb8f94eb59a

  • SSDEEP

    24576:O33VamN76KK07iWxgspm1PNzxZ5gnrog8aRafukZvuqI8eFLC15wvnPdsqQ4s:OEmN76KK02OqPt5grogpRamuuqI9FLCh

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 38 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\279f160fa72fc360880bb2200feba630_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\279f160fa72fc360880bb2200feba630_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\is-EOKLP.tmp\279f160fa72fc360880bb2200feba630_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-EOKLP.tmp\279f160fa72fc360880bb2200feba630_JaffaCakes118.tmp" /SL5="$4010A,1225093,54272,C:\Users\Admin\AppData\Local\Temp\279f160fa72fc360880bb2200feba630_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\is-O6JO5.tmp\kls.exe
        "C:\Users\Admin\AppData\Local\Temp\is-O6JO5.tmp\kls.exe" /TOOLBAR /DEFAULTSTART /DEFAULTSEARCH /CHANNEL="310"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe
          "C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe" --install
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:1876
        • C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe
          "C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe" --start
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:1576
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /i /s "C:\Program Files (x86)\StartNow Toolbar\Toolbar32.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:2744
  • C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe
    "C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\StartNow Toolbar\Resources\installer.xml

    Filesize

    1KB

    MD5

    335399cdd3d87a3e9bd273d0a4cef7a7

    SHA1

    8a69758a49ee99b9633cbabd9cffce9cf34330c6

    SHA256

    eec73880d51ff9b990225b1aa52ebdeabae742ec25080c530f0c5b410a818ce8

    SHA512

    d5d02b9bfb82098179811174b45a52497d8d20be8eaf749cfd4a1af88e0839c51524c86f673a03410a2f4493f205ea6002bc178045d748625933b1de78e98f0a

  • C:\Program Files (x86)\StartNow Toolbar\Resources\toolbar.xml

    Filesize

    5KB

    MD5

    708a8b8ee1337d1c7e7875efe7177225

    SHA1

    00622b26a870d228d9699aba832da61b4acfa6fc

    SHA256

    a902339763d62723288abcac8fdc53108960144aaa93fb305afd4d326f6184e2

    SHA512

    0efd3e675bab299636f28cfa98bfc78a3b281a7168d74ae04c8627c0e0413cc8a44a769d2aff7de59154a5860eb92ad347953cde2a9c9aef537d1d07399d8a6f

  • C:\Program Files (x86)\StartNow Toolbar\Toolbar32.dll

    Filesize

    490KB

    MD5

    264e17157f8ab689420036788be89fae

    SHA1

    3729386258b989c278c37dcd600bca349fb4057c

    SHA256

    e817bc723227e62eebc20ed9b8e51a553d2994c60a43f116cec92cfa9ef59a7d

    SHA512

    d56575b597e8f0bfb6390126768abc0912a21c9c041101314cf28c2e57f0fa73cb83f6a15f2533dce9237a88ac60a616eca4d14fb21e13b4a3ef40e40ea6ae70

  • C:\Program Files (x86)\StartNow Toolbar\ToolbarUpdaterService.exe

    Filesize

    261KB

    MD5

    7ccf424450af71461ca5aca14fb45b72

    SHA1

    f40d32cc5fb2cd3466e3d28becdf178386092048

    SHA256

    faba02d8276bb39b7424601005583318eb697a49dde79b26f795e89dffda3a23

    SHA512

    553ebbd0d818d645b94139f52f22773cb1cdc1b206845c449ab7ac489b57ee92fb2add31b00aac0dfb57f3f90ba1c0c1756c43715fe2c2d5ac938ffe49c6954b

  • C:\Program Files (x86)\StartNow Toolbar\uninstall.dat

    Filesize

    244B

    MD5

    f3b1e3a55e8de1ddfc24db7717dbcd5e

    SHA1

    679978857b86e5a1c5e2ab6c21d9c3a02f88b99f

    SHA256

    aa5973cddd5d048ecc5d5710abac71287b594eccad7809d44c6665aacc75a5a4

    SHA512

    a533ccf92e0f54e7ba3c37fd40f268c2d02f46a8d3536b8a4e1a5d375010bdfbc69f531ff0f14cf300a44b6cd98cf0aff19f29e05f5a7066140a3492bcd17794

  • C:\Users\Admin\AppData\Local\Temp\nst1FA3.tmp\linker.dll

    Filesize

    6KB

    MD5

    8450b29ee8d592c208ba1aaf6ee50267

    SHA1

    75096da057bc85cef63bb0eec168652ea75cf618

    SHA256

    53aa57e582dc56421c1191a0a9efac9c36960b903b7d825f3b9682605ec2b612

    SHA512

    d23a3057053a1f36f5eb212ae0b09b9b0b41e50b8a6a20bbc46c12c51199ad0bca741bcce17534488158e8f2b9470dbdac2aa059688b7588a05778c40d461039

  • \Users\Admin\AppData\Local\Temp\is-EOKLP.tmp\279f160fa72fc360880bb2200feba630_JaffaCakes118.tmp

    Filesize

    696KB

    MD5

    8aa8c628f7b7b7f3e96eff00557bd0bf

    SHA1

    9af9cf61707cbba7bf0d7cbed94e8db91aff8bd6

    SHA256

    14d4fa3ea6c3fbf6e9d284de717e73a1ebb5e77f3d5c8c98808e40ade359ea9d

    SHA512

    5e0a4765873684fce159af81310e37b6918c923ccede0c4de0bd1e2e221425109131830cff02e3f910f15b0401ee3b4ae68700b6d29a5e8466f6d4ee1dcd6eeb

  • \Users\Admin\AppData\Local\Temp\is-O6JO5.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-O6JO5.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • \Users\Admin\AppData\Local\Temp\is-O6JO5.tmp\kls.exe

    Filesize

    712KB

    MD5

    b14e34c63e05fd86a22cca5eaba471f9

    SHA1

    7dab4ffc80a3f58cdfe2bb8e82612fa44f6b58ce

    SHA256

    03fc36f8a5612472d392ea602c40a9199fcbbdba670102b1a61b50e5a76128da

    SHA512

    b5be22c575d78eb3acbd18a51d558598a5609bb5f601ced94c3337b4eb05c48904807a62ea792eb46d41ca999e837fc2d8dc9d32de1c8d8d3d0cac17b65ef712

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\GetVersion.dll

    Filesize

    6KB

    MD5

    5264f7d6d89d1dc04955cfb391798446

    SHA1

    211d8d3e7c2b2f57f54a11cb8bc4fa536df08acc

    SHA256

    7d76c7dd8f7cd5a87e0118dacb434db3971a049501e22a5f4b947154621ab3d4

    SHA512

    80d27ee2f87e2822bd5c8c55cc3d1e49beebb86d8557c92b52b7cbea9f27882d80e59eefa25e414eecee268a9a6193b6b50b748de33c778b007cde24ef8bcfb7

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\KillProcDLL.dll

    Filesize

    20KB

    MD5

    de2b06d8abcd4a1d3330e415ce638a6a

    SHA1

    2f1bf738915b288530dedb861f4ea4f60069a91f

    SHA256

    8f62633831a326174f05e89503e42a493aa834fa6d7ba7138d9d57ac5873512d

    SHA512

    8dbc0edb71d6acc327418270b33d5627d7940ce406e54152af9f6c8f6d90c7239aa647a0e1f4769d0aa8bd3e38d60643e6356ff7a5ccf7dc44c5617f72277b70

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\Math.dll

    Filesize

    66KB

    MD5

    b140459077c7c39be4bef249c2f84535

    SHA1

    c56498241c2ddafb01961596da16d08d1b11cd35

    SHA256

    0598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67

    SHA512

    fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\inetc.dll

    Filesize

    20KB

    MD5

    2f94245152dbd233e248909f9c01c578

    SHA1

    ab4e5879c001b36a2f9ff214946599fd015edda9

    SHA256

    4c4d85eb9725fc7fade03467990e3dd9671c29a7870c97e69babc2cb3c9adef9

    SHA512

    f92830de27d6663be5e0df9e32cd88732bc7ee93b14c1ded65258c325d22436400801aff1124f40400c6c3b3c16e71deb08436714716f3888d13a8a6b6a32231

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\md5dll.dll

    Filesize

    8KB

    MD5

    a7d710e78711d5ab90e4792763241754

    SHA1

    f31cecd926c5d497aba163a17b75975ec34beb13

    SHA256

    9b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2

    SHA512

    f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    05450face243b3a7472407b999b03a72

    SHA1

    ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

    SHA256

    95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

    SHA512

    f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\nshist.dll

    Filesize

    39KB

    MD5

    d3686f7113ae84568624746249cbec6e

    SHA1

    a5849fd8e5722f91e58eec28244e9d54387f5912

    SHA256

    0d8fc9dc3894ccab669eee7e07c7d53a85ee191069c5e02140a23bc19461ec39

    SHA512

    18dec8ef52c343587e7790bbb4a0eca9a02efd37ca347e2ed72d03c2021486b240c8d451c2d04e1b564c80eee437b4730d53c7702524159291255a15e6de1b6d

  • \Users\Admin\AppData\Local\Temp\nst1FA3.tmp\timepro.dll

    Filesize

    20KB

    MD5

    009dbbdd1ef470dd752c2b73835da3e7

    SHA1

    f97da6556b24302df8201a092eaa32a80d49064b

    SHA256

    c1ed8c398108dc56fbb6fd6797c3c9df59447e2a2f198b72a45058124971b09c

    SHA512

    dbffa0eb830b292e5550eb3f3cfce90f881282652afb0463672ece7eb0946c34a8f75c4852f77b1db3604f0f346d0ed9d9babbad40b41de109e9f5119d555ec5

  • memory/1868-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/1868-463-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1868-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2684-59-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/2684-48-0x00000000005A0000-0x00000000005BA000-memory.dmp

    Filesize

    104KB

  • memory/2684-355-0x0000000002AD0000-0x0000000002AD9000-memory.dmp

    Filesize

    36KB

  • memory/2980-22-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-476-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-18-0x00000000003C0000-0x00000000003FC000-memory.dmp

    Filesize

    240KB

  • memory/2980-370-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-23-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-21-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-464-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-465-0x00000000003C0000-0x00000000003FC000-memory.dmp

    Filesize

    240KB

  • memory/2980-467-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-470-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-473-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-11-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-479-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-483-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-486-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-489-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-492-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-495-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-498-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-501-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2980-504-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB