Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 03:46

General

  • Target

    2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe

  • Size

    250KB

  • MD5

    2a3d7642a1fbf238e9ad8564d3eb41c5

  • SHA1

    67b7f05293b47ffe3f0a6863e6d1f9595dca0ede

  • SHA256

    b30dcc7111fc913bed204ba2e3056206d9e91a90695148a3f4df382df1a08fa9

  • SHA512

    64fdd416d89147d6d21542152ea9bbee3c9e1a3bf359a394fa52230e217306eb15f8fbe7f713c12c17e2a4e2e7134a10875e81a6b59ebcd12aaef75a5b3f3618

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s55Z9ZHMrDaf+OtUQ95NGzs+:h1OgLdaO5vZcDaJtUis

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a3d7642a1fbf238e9ad8564d3eb41c5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\50f512627d756.exe
      .\50f512627d756.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SaveSale\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    e2b9bcf63a2db18d2e43ce2aaeee0584

    SHA1

    78416da3e8b3d59a29094836e0efed6da0649737

    SHA256

    40a452a0efb4f8cf38166a813615b4e836aabc598e9d9f8ee0249c8ac0e307b2

    SHA512

    20d8d5c38146ebf9a4db93d05cf105e2f861f6b2e2176315410deb47db04ff35ed4252150f20b0d1257381512137892589bd2b469b39174dc02b1ae284b0a684

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    db0c81f5d915a8eced56b32af6f65df3

    SHA1

    200b1c3158db50b0151c710f4dfa05a082f6f1b8

    SHA256

    751d2645922c8a20edef0c2d8c33cd4a21bef0ba212bf1a2402fd800a4b4d072

    SHA512

    033809096df8cf6fb99d2b1ae96dc12ef3f636ffcae27eba47a46e40e9c7bdf2c7f66cb562424edb9d64283fecf8c12bd5590b96eeb8809fb5e1b274a1c9fa5d

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    10103be2a07f5321f61873349b4f50d6

    SHA1

    c211bbde8235eceb909a9a19162d9ac97e2f0b9f

    SHA256

    ad5040b12710157cf008020587b22996f05b61d4c7862dc2e460064fa1cc202a

    SHA512

    df4c81b489e0c4b521db3b123c4c05bde80905ed217e16a5fa2eceb276047a0a49d0a2b57d864b1af7d5183d5e49c556be77ce606950cc51e2c2d558069ab623

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    a50c0dba5b0dfc5fa4f505b7c8236bc6

    SHA1

    ea30392669a6fc7ce7a0eb283b1d8968665359f9

    SHA256

    74f579754e6246e850c7a96a0910cd61b0100e5ca58ba4ff86e1fbc2b8aed900

    SHA512

    57d72bf6aaa7fc1314002f345860c18eaae45da6923681b2fecb2c735ec04c7569706ac2aadef91bfbe89d88d8292a8c508e444a5c7674b21207b12ff973394f

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\[email protected]\install.rdf

    Filesize

    705B

    MD5

    2f70c42bfc991244c1400306918a41d3

    SHA1

    dd2c685eb1660681f771a245e9f84638b5254e3b

    SHA256

    5fe059e5bb8f6d47ce19fecac2e1a6c1b5e0279a13feb7bef3fee976d4fc557e

    SHA512

    012020350c2c2cc009d3d6d4a962cf141bb995617ac64413168006356e722b50e34eb43b4b755c8fd4e74189584c5b1b8bb3da169e032167c5685957743e40c8

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\50f512627d756.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\50f512627d78f.dll

    Filesize

    116KB

    MD5

    da161da8bcb9b8032908cc303602f2ee

    SHA1

    8a2d5e5b32376a40f33d6c9881001425ec025205

    SHA256

    0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e

    SHA512

    39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\50f512627d78f.tlb

    Filesize

    2KB

    MD5

    1f14de44d0d63a79f91d3fe90badb5fc

    SHA1

    7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e

    SHA256

    bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c

    SHA512

    86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\50f512627d5622.92738795.js

    Filesize

    4KB

    MD5

    fc2c2fcca56b87e15afc03181a27969a

    SHA1

    807637375157a042fc32dce2616db21338b05e43

    SHA256

    7c3f6bb45f77b981529c4389ef8325be324a9832a04a1ead19d05db701b9e053

    SHA512

    8a4c6e5f3af393c0e6510ed578452837eba42f76c3307800ba2306ada58f59799abeca29358e5cf78faa4fe15d4595c7500cb6ef4260a6b9a4d07a5d447803db

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\background.html

    Filesize

    161B

    MD5

    5412bc0500d2753ebdd8a695dd447d8a

    SHA1

    84c3897c7e76d663938902beada670bf9db3d6f5

    SHA256

    1dab39e561fdfd58f4475f37cf7e03135948aa8101e6b19468000e66b9c4bfb0

    SHA512

    ea4fcaad78670b8a080792e3bb606fd289ff83a591e112e9ee43d1807b45ba8e2d031fcbfce3a245076c6c14f8bdc948e38ca874d57d26f686a5154977f1e2d2

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\manifest.json

    Filesize

    475B

    MD5

    f91cd42bdfe41bcc97d2eb37eafd8bd2

    SHA1

    c0dd02c8f7959b84bf6583d62ecd308651c37b6d

    SHA256

    6805fc1de5ccc99d653689693aeb3a390116b024eedc26b0ca00a7296ec422a5

    SHA512

    8a043a54c40787174c0f167c0083899757803b06100189a9a485d86ebadfa791b83af0e8a502fd34c2b8b20ad9b4c82cf1c302234db69006cf089e0b7179ab2f

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\oammdpghndmjnhjgaeogogefnkockonl\sqlite.js

    Filesize

    1KB

    MD5

    8eda1541b1f1d464deab4b22db86b4b6

    SHA1

    b46d101dc5df16cfbedf5a06f210cc0168bfca63

    SHA256

    4ef8768a422505540ff90e193594d6499c604473929f883f83948d44c5fc01c1

    SHA512

    141f59cd872753d6cc0cdc6fa1a90a4fabb6c0c02bb9bcaf7eae9e25fc61ded8ec87ed0b2d9df03f319babca75344a50e47726351a62327f6261c02af200ba7c

  • C:\Users\Admin\AppData\Local\Temp\7zSA22B.tmp\settings.ini

    Filesize

    6KB

    MD5

    ffa4f149476146b336bb9f77d37411e6

    SHA1

    fbc085d3a1b44d9a3ac26752d58d7dfb1a755170

    SHA256

    3bc585ef2d37a3272fb4d0f379bee820befcc94565d8e0cfcdfcbdea537ec9c7

    SHA512

    cbcc0f3d98f9faf187ac4f2539fdfcca0022c0e396fd4223b18cc4880a905e0027dedd98588485982c280c690b704aedf67372ac997dfabd4c08403f2be76b79

  • C:\Users\Admin\AppData\Local\Temp\nsgA307.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsgA307.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/224-77-0x00000000741C0000-0x00000000741CA000-memory.dmp

    Filesize

    40KB