Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 13:55

General

  • Target

    403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe

  • Size

    253KB

  • MD5

    403b28a97274b8456c3af994abda96a7

  • SHA1

    d55eac30ef0bd979fc84584bdb57fae6799b6e5e

  • SHA256

    0e6f1727dd0afcce822e676739dcee4d04e87fbeaf628c502b616b575d302859

  • SHA512

    46e7d4c267a26483b42295d94944b15fd63a82aa1d4107e750463d5a818d3b476b8fa6e998735a6865cd971d3d1215605050941b0912720a2e212dac90f979b7

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5/MfQvFg6tJvSsTE0rb:h1OgLdaOUqFg6LvNTE0/

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\403b28a97274b8456c3af994abda96a7_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\51a8ced8cf613.exe
      .\51a8ced8cf613.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\conTinuEtosaavee\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\51a8ced8cf613.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\51a8ced8cf64b.dll

    Filesize

    109KB

    MD5

    0e39b69f32aafde9527e88beabef66af

    SHA1

    6c5f221b49ad2693d21ee0528fe6286a410d7517

    SHA256

    1c4ba81c723f896ae542e6e55e76cd1062c50b82505b50b91f7d756bae8ec607

    SHA512

    33ca5f5fe377bc0cbd35592445bf771dab1315a3fc34b73ce961f94db42b269c94ca1bf06f1c2434278f4872445363fdaa016ecf8b60c74fb00230e9961b9165

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\51a8ced8cf64b.tlb

    Filesize

    18KB

    MD5

    5c4616e4ea60383a9900d27030cd7cd4

    SHA1

    ef116081b72c995e1240e2b381bdae3e21a1e2ff

    SHA256

    ff4cea2b1584b8e3f274afcc77fc3421dfea1dfef8c43c495449524bdacf1c6a

    SHA512

    740ffc33441c588624317a9d5b414380e826ff9a637a7260f3e5dec7e3615595e9874c7361a5cd4e08386419121e236155e8b4e81796eabd0eaa97b02aaf1e16

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\51a8ced8cf4290.30186951.js

    Filesize

    4KB

    MD5

    cbf01d5e703788cf0390aa1e4ae13b6d

    SHA1

    539f9b10c20a61cf512dc7637416c1ea5d527b78

    SHA256

    eb6a62082c513e40d6c8e02430c491e2376a0cc3d4d1c6093111fa8353996169

    SHA512

    f41b098fa589c08b040c38cf5ee4286bb861a794fe325e72ea28a6e779eab4da9c2cb5622a2bc6942800a4edc7b48cc896b7f8b35ca6ce34f06d1430c21d8900

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\background.html

    Filesize

    161B

    MD5

    2b16687044ec9f3c7b4a5ee2005bb1a4

    SHA1

    1850a07ca3790abefc2785a9862321692337fc9c

    SHA256

    c338918074d0d38f33dc228954b3f5e3226d25f578071c1404642513a1fbaada

    SHA512

    a85c0ccdf4d8421a876e7b1c61bec1ba9706c84d66719fe512feb87c59af3747e7b40675019ef8643e1ded4ade9da3732826a33691323753716bdc49c3d0f65b

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\manifest.json

    Filesize

    508B

    MD5

    a7174d7c9158b5f7f330cf2916a639ae

    SHA1

    f7246dd07dd4598797fd13cdffe4dfe56d572b77

    SHA256

    cd184246185c663e155f8198d9aef9f78468131e3fda18dea5528b2e9e48bd86

    SHA512

    96c16dafa55c6176d5bfa29f95d43ecad13ba53a2a450669c44dc0a6628503500532a739bac0cb25498b75e593059babf0cbfc1d1df8c6f4d0e4142c97361bb3

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\kpblojebhcjggbdcmchlaionnapdpkkm\sqlite.js

    Filesize

    1KB

    MD5

    06297423b04e9a74b02a9e57789286bb

    SHA1

    604d4f590e6db4f2b0ff7309a7e54b5955417565

    SHA256

    1b4465cd700b44f3353b0a4c17ffe6f041712737ea3451c695f6119caa99b3c0

    SHA512

    162c65eaac84d50c03c4359247201fc0b935c6088c24308f4eb121a4751e63db994876a937e6f5184b97a820067013391347bf19baa1dfdb5739583e3456688c

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\settings.ini

    Filesize

    7KB

    MD5

    41ac81b34cbd42bf27bed2d57cec0ebf

    SHA1

    a0fd5f9b05fe58629d74eeac664016c630cc0c43

    SHA256

    fa3000f949673223fad2262f432033c718db0275b6ad7ebbb164c96f32197711

    SHA512

    85a2a51c1e9d6e4702659b9b5a7e8f79920c5b090472c41c2b631cce381077dc0b2bdbd7447b5f8b2f3dac4bfcf577ada37983bb9a0ae0d80d5a2b09188f9cf5

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    593940dd24b6dc43f85169b1b7eb6c07

    SHA1

    6c8357f2f2800b6adf37d364a4b1279d95145a43

    SHA256

    2daa650461213cbe8e6135b926b5d673ab0724616ccf09688fb913c413296258

    SHA512

    1ec74353f11a444f79a19734602ea449c94482d83ed3fb0f40af5dfd275a66a0aeb701f2e63bcc6d410c24c6438794cf80ea31b58c2cd1ce9e33d9a7fc7eda85

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    b0403bcb70b2feef649e3b480524c113

    SHA1

    963a7ec562fb8ba8cccd29055a4e4aa3df33cf40

    SHA256

    13daaed6d2e9cbb1d1202651151c8178e06f065a7e24a43665c8e3ae2c85c7b1

    SHA512

    e9918a0c189ea7c2a21ad736ad09eb5659d3ae7be34257adcc579f85b13bac2669592c8ec7bcb74e939b201bc489ab981a2ccb25e7244ff48775de3e1b8d90d8

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    59b43da84e3375d2fdf2a159bd4e452d

    SHA1

    244d49243e84e5b30c1c26a10b2d9701f45ed0a3

    SHA256

    77208316be47c770359f5300c72c07e1d6c45fdf301551eca9aa3ccb7b78ce83

    SHA512

    e70d1e88e157a837d84da034a6b886c4f60681739422ce87658a50670788116861151f56e82ef3245b368730b5327db60c48ac93d38a92459e44e65491c031af

  • C:\Users\Admin\AppData\Local\Temp\7zS6C47.tmp\[email protected]\install.rdf

    Filesize

    608B

    MD5

    4da544b2f19125f90a3813c781de3e2f

    SHA1

    af8b32220eb3fba46e52a5d35704b75204a7841c

    SHA256

    62f3eed1b71bafcc7542f65e79f75a30357b42f9f4dea177b80eab44125ff79f

    SHA512

    c59a159fe7c0481ba6b47fbe890c84e3b24edb1004c281313bd72f2ad29ca975bc22b8becc02e757be9b63497071d04a333008742881b71532edb97c20697dc7

  • C:\Users\Admin\AppData\Local\Temp\nsf6D32.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsf6D32.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/1212-73-0x0000000074180000-0x000000007418A000-memory.dmp

    Filesize

    40KB