Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 17:54

General

  • Target

    JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe

  • Size

    255KB

  • MD5

    8ae4fc85d902009beebac57b52e784cf

  • SHA1

    48d6852775db8aa62f6cf37b44bc09eec0b5f5a2

  • SHA256

    6288bef4ba78b121fdf6c86b0b87b8f69402f6361a026d3b66ed0e5baa9f012d

  • SHA512

    cb7658d700899d9c46c35bcea627b2a8c61ee803e6af48b8c5f1f7c00cadfe128fbc2530a7c649058bf1e19a52d1f0c4eb11617574b5f5e5dfb6e49cc3a506af

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5GM3torRY9mrWJY8oYlx1608Jgt:h1OgLdaOGMYWJY8Tx1V8Gt

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae4fc85d902009beebac57b52e784cf.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\51824cd72b39e.exe
      .\51824cd72b39e.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Brouwse2save\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\51824cd72b3d5.dll

    Filesize

    115KB

    MD5

    000cf99d5e93b57e2ec5aa467244fef9

    SHA1

    5356cdc3811ef26cb671b3f6614634458d778ce9

    SHA256

    2fb11adc4496ecc8543b34b1dba3312444eb9e77a2bd4eaf42e376f3e0b87de9

    SHA512

    c75c1844919ab9d589cb5214e19d05967c8ed62565b4dedb999d4b3c216c6ef165b64d9f57c3996895f1c8c601fe62a37cf5912c534d5f6ca921dbf0cee064fa

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\51824cd72b3d5.tlb

    Filesize

    18KB

    MD5

    b8d31af5eeace49ff1e44abb53abf9af

    SHA1

    59fb16dbe60a460af8b47662436f63eec36de95a

    SHA256

    c4b27e38a0c172d87dd2c20959ab37469c7ec2432da9508f34ef57e808982393

    SHA512

    fb56c102ea4002650394307f025d21f446061e4cc29249f1decf3eec2efeb40f9a912cfa8dfc56b6f80cab9cfb57233c674947c3bd11326ebe7abecd2fa82bfe

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    ae475bb368286bbf569f93609789ef63

    SHA1

    eb1048b633eb03b0e13535c683df9872d75b0f34

    SHA256

    c3153e34b247e979efeb9ab0573df3625f4b0bbc03c35cbc4ba4a9682dfdb050

    SHA512

    6db5103b9f9c59698934fa2538ddf2717824ad84def37954ecf23d5247d681011fcff67bd9371ac69adc6387e5d9ef8af208ce74a7051d855766a3f3ba0e1c3b

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    739b8d5d073b1b99204275f8725cd125

    SHA1

    fbb2bd941b4c9736231f683cc50c0de38b49f0e2

    SHA256

    5271908acccd5bd7e523bcb63b1fc2ebd8527c49d4be85619c71077949aaa7d1

    SHA512

    2184a86856789d5f0557e6df08546d5eb044fccd876ac021ba545fb9b2f0da39e49e92091f6ec3699b92f57f54f67418387e62fb1ce6eeac8c21d834a1fc5a1f

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    d0af47179803b617f6a5cc2b2f7e2842

    SHA1

    c1814ee96eb880f42af05db6bf94a2da7d9e81bd

    SHA256

    527b5f6ff5684a04d618049821ef75fa342c44b9e64a564797d3dc68a00f0699

    SHA512

    d540cc46c2e4ebfc781351222753027066730ed55b360b0cf60037ac430778bc5cd66ab4e8fa8082f57000063fb17c8513e106fda850114b0bc005499c0cca53

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\[email protected]\install.rdf

    Filesize

    605B

    MD5

    7b0edcb04eb57da141ef950b52e57822

    SHA1

    661cee1153e3d26854838e823956fe973aa3504f

    SHA256

    acd7c4450b440bb61dee5f77e42afe85fa6c9f424f0caae161e5c079aebf26c2

    SHA512

    e708b3dad35e21aef9ef5bd81d973e4429a20c0a31fd96b98db129b96d294dc3a593e0d9bd1d1b8b3ebd0a6c0b79bd98ce3673efebf2514b56c6d33747c9c819

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\51824cd72b1cf3.72933550.js

    Filesize

    4KB

    MD5

    9b20963c0332299593ebf5dea6b49d6e

    SHA1

    8263c5a72e8c6c443fb5bfbdd1afc39954f3985c

    SHA256

    066f9d348bb36bd306aa2fabb4c62cbf932043928999a4693899fdf057ee415d

    SHA512

    c404cb55b5609ff826054b0be9f7e3995c5802e98c5906f0e385c6eabf8e2df81f1a415e3887917f2b27d8d4cd40d762ac05986ad4e96307af722a6ccd8e72ff

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\background.html

    Filesize

    161B

    MD5

    61878be54ea7b0b9fd9469a1c5f3f3bd

    SHA1

    74d8717846bc6af6bcbf07838160408a93a85b4a

    SHA256

    367d1c6ea073049cc924a2a1286ededa24a1e55394f795b2298b6300f8441cc5

    SHA512

    ace89b371422d339a91066a7b5e6cd9786f9a75e0a5d69d46cc4d691408b6527cd9d21fb5e10dac2d9c2e3d9810a0147d11fe75915c9308bd40e9eb9b9ae6d33

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\manifest.json

    Filesize

    504B

    MD5

    0026220045ae9c28295aad9fada0e2d3

    SHA1

    dbc6c8984e99a3ed461ff848322ec27bc53f7e74

    SHA256

    91450c5edc2728620bf5917301f7337016a4f3f059b129c1c35377096403fc00

    SHA512

    7928f99dbf2e5ff94eb135e3567fc52e2d20a145972f16aa7838cb064a50c0d41eb776ac3fd292e5ceabc8481d715fd108320e627cfa30b51bf2ed373cd5436a

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\mpoagenmnmpdganbcibgdefgfihgeneg\sqlite.js

    Filesize

    1KB

    MD5

    e54a07bbe4ac9d19e80eca4d946a578d

    SHA1

    4c501e06db7db70c80e7bdb7d2e877efb45d483e

    SHA256

    68bf3bc4cdae6477317b5a04d532f18c924eb68cbb33699e0056db42c891ee05

    SHA512

    fe31c8d6caadd2ef988b2cd38ca4cd8a957e7ba8e12960d74756dedf998b0b1150a0f89e5877290a187fc91d04f5d9af1ea12f3c5edc78ddba37c239b02770a8

  • C:\Users\Admin\AppData\Local\Temp\7zS98B7.tmp\settings.ini

    Filesize

    7KB

    MD5

    0b54ee4edf09244448fb0c84e623eff1

    SHA1

    8fd00a3e29575c950a95ad9aebf288351c731980

    SHA256

    edc36f3a710b74f7bb26c667d03d8e94065882a4144a5f768d1e8a6d607a03b7

    SHA512

    12b896d65f8a40d51e2c01cb684f7332cbcf8f82b3b98076a0b90110d83f1196c4b7d5c22231f5b91ba217c51bf4cc3bc7d53e9a17c6975f8119f74e91447968

  • \Users\Admin\AppData\Local\Temp\7zS98B7.tmp\51824cd72b39e.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • \Users\Admin\AppData\Local\Temp\nsj99E0.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nsj99E0.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/3036-75-0x0000000074E90000-0x0000000074E9A000-memory.dmp

    Filesize

    40KB