Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 04:35

General

  • Target

    3dd2cdbe38309a6aa36b53f38ae2d552_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    3dd2cdbe38309a6aa36b53f38ae2d552

  • SHA1

    6a53882865f040388f0aa29ccf181899ee7c1b27

  • SHA256

    e7aa0a5432e4473293ef50a18ade901aa95802a8ea6cd1dbb2f48f5ebe4025a6

  • SHA512

    e68f1edc9ea1cd005506cb863b35fe6eddc4789123482f507a70d788f59b12e29ef79d5e81d1054bd6b795021e9a71ce5f30d745c103c9e8e04c607ff77beeb1

  • SSDEEP

    12288:oKnekrL58F98U7VSA1oizErC7/Pej5VeyhKhe2vbfoioqVKBpifNMI8/z9HwbBiC:hLiEO5rOXeyhK8Ko4fNM/b9Hwxx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd2cdbe38309a6aa36b53f38ae2d552_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd2cdbe38309a6aa36b53f38ae2d552_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\00294823\bWwVC.exe
      "C:\Users\Admin\AppData\Local\Temp/00294823/bWwVC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • System policy modification
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00294823\bWwVC.dat

    Filesize

    5KB

    MD5

    39ba39db6a202de75b3b3d1a49c778f8

    SHA1

    514a9ab7c9742d34c8a69ab54e1b4092cd811b65

    SHA256

    345ee7c386681a3e4e3370ab6517a5480f7be75d403b7493f100050d99c9e4d6

    SHA512

    97ee70bdf22b8cc6d6ea0a3d68df1685fdd4b7044e6b57022fa8dae288ceab3e3b04e3a301736589e6841fc47a0db15623bdfe25a7e35a231f23578c17f78a36

  • C:\Users\Admin\AppData\Local\Temp\00294823\h9WF.dll

    Filesize

    222KB

    MD5

    e9b27306a18f18b88945cdf066de2fc9

    SHA1

    4d18490fbb336e261301a967047065dd561cc2f2

    SHA256

    a9880b90d24af3786886306aefe5c79ff3cb2fb7b36ee5fb7bf2af85f240d63c

    SHA512

    f255e8bfb13cfa070b31f47b12a4aacf9ab75a6a8191b6b83740d02c3f007b6d5255a5c2c12bc7b599996742973d2faccb5463d96d16c7aba40e34776823c706

  • C:\Users\Admin\AppData\Local\Temp\00294823\h9WF.tlb

    Filesize

    2KB

    MD5

    39d776f73d1d3f771aaa8c3561367c3a

    SHA1

    eef842aa02927bd7fbe7d569c5446ef1a2ea065f

    SHA256

    c2156787eeb818e587529572599fa124773c71330fb93e1c79f4cb9141090941

    SHA512

    3174095accbf422730e60f61523dec01a9a4519cb4642a641c5f547d530ad41f5386d383b90f7daf34f1f36635775929e99d7fe0030aa24cee30f4de8376eeb3

  • C:\Users\Admin\AppData\Local\Temp\00294823\hpklklmhajkbhfjafmnaekbldabhmeaa\background.html

    Filesize

    142B

    MD5

    00463f93b150f70e9ff06de2bd47a026

    SHA1

    a617bc4aa0ca6a997a094a91addce6305e013b76

    SHA256

    c013f22488b8a141948081f817ffa6c6c051baa6dd85fbc919480674bc479966

    SHA512

    737e0062e009327566640c37f87ab395f64270a226e4cb455622c43b30bb4f2dc04a8fc29d96933aa78f76698245bd8a497884553b65742bb21bb9ddca585b66

  • C:\Users\Admin\AppData\Local\Temp\00294823\hpklklmhajkbhfjafmnaekbldabhmeaa\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\00294823\hpklklmhajkbhfjafmnaekbldabhmeaa\fe7P_.js

    Filesize

    5KB

    MD5

    13883792c00a379e4843101756153d06

    SHA1

    f4415d8eefa6aa72c908941d09af9bb2e097a211

    SHA256

    a562f2e12f0431a4cf0f29b251b4af0ce0c563831cf2e1845e787195ac0d0975

    SHA512

    57cdd48db67e48017bd39c3fefb915df74428addf01180c1f78c70fc1830d2cd960b1157a1ca4ce5335a7060d0b5bc0b398460e067d011e6dd5efb7cc7ab5fd2

  • C:\Users\Admin\AppData\Local\Temp\00294823\hpklklmhajkbhfjafmnaekbldabhmeaa\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\00294823\hpklklmhajkbhfjafmnaekbldabhmeaa\manifest.json

    Filesize

    512B

    MD5

    ef118dafc9d72171ed5fe02f27a06829

    SHA1

    5eb206a8afa1c14c5ba17304a202549c3fbbbb82

    SHA256

    24f32ad0247ea2343f90ba114c99b8192a16688539a1ee7ba1004d0d7207a84b

    SHA512

    6d94a0b29249038efd914d821d381e8d4f9cd2a6b6800c0bb598658b8d136000215e541934aac810bb0c45c9b86348e1abb6c15e417bbb88f1f4044f8bbf055f

  • C:\Users\Admin\AppData\Local\Temp\00294823\hpklklmhajkbhfjafmnaekbldabhmeaa\sqlite.js

    Filesize

    1KB

    MD5

    14f6fa261c99e3fd0fa55444a85b2150

    SHA1

    83e6e5b8344f2fa9455116cb2c4f253476181994

    SHA256

    9b211b6835b80b4c68f6bedcf6b6550935d2f0277b5870cc534683d34112942e

    SHA512

    bed369c55c9aa75d32a3c948ccaeffdc8c55f91ccf8f41ca00666a773056c3809f323fd8a11fb38de59cb147665867fedaf9160c68017082f6ccf4abf7a1f2f2

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1b53c596cfb1aa2209446ff64c17dabd

    SHA1

    2542da14728dcdbe1763f1ee39fe9ceae38ad414

    SHA256

    a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f

    SHA512

    be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\chrome.manifest

    Filesize

    102B

    MD5

    393382e4f66a029bed92ce8d33891e3a

    SHA1

    f5a4f7981fcacb8cc070bb386041e601a2ba87f9

    SHA256

    47c2dc7af128a54ec15539c22e3fd7766e735cddc7b1b9cfa0b201740daf5f88

    SHA512

    4369d511ce9e94f9300c028ad81e5e4d20ba9952930b27c3819761d75a54dd1d25f4b08b098c0da6f5c089bdd5aafc0b30e46c4b97a8c73f7e156dc058903b39

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    01b7bc1ee73401e722f5dcd1986e0c04

    SHA1

    27a68f5932871b948804050f7e09fe7280db2241

    SHA256

    7ba22f30fa2fe4bb8983eabe563c6760bc14fff1e47f36c2848ab15b72b463d7

    SHA512

    16f7976bd9e3ec63b67ed1a7d0ce6ccae22c8d19a782b5452814901a03fd3ae7fba2dcd4ea056b38982ff2ea931d88461517a6e4638c85d29ab772ec77fc01d6

  • C:\Users\Admin\AppData\Local\Temp\00294823\[email protected]\install.rdf

    Filesize

    608B

    MD5

    43c2169e5b8f5146a849859abc6a86ff

    SHA1

    38bde8a19b5ce830d232960414e8c862f3ab0618

    SHA256

    2489086d658b23df15e8424cefef45a8337621467eea1a21f4203b09061b63af

    SHA512

    6af2c9adf27980062c3a7e3a06a1d63c16525705ad917ef5fc531bf1ea90b77175c4642cfc56b9a01c8b8e44755b81f8698463704cfb62e78f43466d99178857

  • \Users\Admin\AppData\Local\Temp\00294823\bWwVC.exe

    Filesize

    334KB

    MD5

    8300c91b40229b42301aebc6d8859907

    SHA1

    0b55e56a6add6b4dd4ceff475a0018a203d02a5a

    SHA256

    f54a6814ac06c70ef5b738eca4855e49039783d96b70ba1ae461bd90877e53b5

    SHA512

    0863750da143e1707513f4a2efe1ad6cf81f5a819c7d5496d1629745afffcf72338aa9de90479d5e0936e848f9b260c434fd369027c56be175814086cafd4d8f