Analysis

  • max time kernel
    105s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 18:03

General

  • Target

    JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe

  • Size

    552KB

  • MD5

    8ae64b49a952fec033b96ddaec67c758

  • SHA1

    f4ed25b418ca629458983e5a2cd39cb2a4c0127f

  • SHA256

    e1d262bfde931ad80626616d1795467b2e624ed209b7282eff094b2c6183aa2f

  • SHA512

    aaaaf385694e96b2bff8aaa434974b0fb09f2abf93cb72cd0309188821d2d0e62bfeae14b95ca57f623d1b6d32fafa080c9ad955a2c3bfeb27085363405b5572

  • SSDEEP

    12288:h1OgLdaOXgbJuMmFcouJqkXWctn+MEfOr:h1OYdaOXgJHJJqkXtMOr

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /n /s /i:"" 1d0TPDAh3.dll
      2⤵
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\1d0TPDAh3.dll

    Filesize

    203KB

    MD5

    41b13b132cb601ecc466654b90296353

    SHA1

    245258ddccb48826f22d57444f49fa30be1b36fd

    SHA256

    7fa4bb68c313e1090587a64b90e87bdcbc14ea3fb7c0e8cff94c657c969b70bf

    SHA512

    0e8de7bbe3695848e299fe3f3506f2e982a60cf0a0dd11cde86de4af67ef3c7b46458680d7bad9cedaa266ea33cb2e77f2aa83fcf1bdd20bf31d1936f2bd69a6

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\Hvi4XwdPu.dll

    Filesize

    180KB

    MD5

    0e093772550eb9541dd715c016b5584a

    SHA1

    20338dc859a5652f5661280dc508f4e5b533e76d

    SHA256

    028999304f35f7a6fc2cf6e360d4ea587612d63ce191fa979cc98ccca46ab149

    SHA512

    0030b395e2fde6bc9f70f52e71d8e87d306cff8afd2acbad725c4cc92b6d7916a38c1d6d156feaec841966492d32394982ef51989e2b8673d7c00e103f744dd5

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\Hvi4XwdPu.tlb

    Filesize

    2KB

    MD5

    48e9706fe9f76731f3576122fc3e9e33

    SHA1

    387c8c4898ead8ace488a7df80fead429eaf167b

    SHA256

    7bad79916803a14ca817e5c39f5ec2f0f240044d6dc24fb4916c8fda338060f1

    SHA512

    e9b44a2b1b7a806066182a084ec9df81916fc6db79710256e173377e7cd64a732c006830bbe324a9a734731ecde8b8251cfa995399f6d4df5322faff99c458b6

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\Preferences.C__Users_Admin_AppData_Local_Google_Chrome_User Data_Default_Preferences

    Filesize

    11KB

    MD5

    61a4cd94d5357f334613b12de580e30d

    SHA1

    272845b80275c631e9cfc428cc1c70bffb96e5e9

    SHA256

    7fd44acb7bd166a59d8d437d62ce98f1fbf852527550c1af453cf1673cb29d5f

    SHA512

    7e4cdc7d99e0d413a43ce5e3366d13ca3e3dab9ec368be5c32a286240e42845e6d8ab42ed04dee091899c42243279b4dc899da9082308cf7e5663e448996758a

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    94c017eb47e93cbeb939277c0847af0a

    SHA1

    bd5daa91a26c20b7106b027fa5f9882d9e87de1f

    SHA256

    098c8b5f35404266ec44ce18c8904d65a46cf6f93e69ee12b2ab54abbdf95a25

    SHA512

    2521f6ecac23fd80b023eacc1d52c28966cebc661fd22dcfa371c91f792388154f503c3d96f9c26399e14e05accd182902b5354938da7ec9e1bd12c2f3d753f8

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\chrome.manifest

    Filesize

    112B

    MD5

    c2cd2da659accf9cebc7849b1b6d3926

    SHA1

    65b357c366f0f1fb74d7da47b700e794d00a7a2c

    SHA256

    b5c08a57b44519221b3967655193308ff4a2e85b9eb79abaf4d22c175637661d

    SHA512

    c4c2eab3b2c047a408ec21ccb540a687f3c35c1767783819e9c09d375db160502f934bf4788d63d12ea2c40032c4329fbadf793a783a6e4a9ca802160c2de995

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\content\bg.js

    Filesize

    9KB

    MD5

    4cfe86b752a6991c8b1a9c8ed92cdf29

    SHA1

    e0efeacbfbad7f12315bc6614b4f880044a2acb0

    SHA256

    e53f9487e425f082de2e9711fe15c000f6cbc18df3d3ea7e2d47ebc9eb09de9f

    SHA512

    a98d1b6daac5b0696ad8a9037905c21aaa77c8a7523311950b304ac144f1c33d90b162257318eba8481f026808ab24eefb084cca81872152757769e0c3d0682a

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\install.rdf

    Filesize

    601B

    MD5

    8d5e3ad927349c0ae0e3b6928b3ac105

    SHA1

    d61b9b6964d8ae8fa4c403d6a09b2df4582a3cf3

    SHA256

    73157a6207d487aeff58bb8c3a81dca572c70ffbcce7be848720ff52fc716954

    SHA512

    831b348a51a248303d6dcb5764c8b68cfa253cfac98dd95bd5c9819aea59a75577110d68ac0b6103376ac71f348b7c70a4a3d2bca832a5b11e51d26f969034ed

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\ifokgpmppbbjekpnbbdphkeblgbbbefb\background.html

    Filesize

    147B

    MD5

    367d10fc734aa1d1c8be65c1d90cc29d

    SHA1

    3fbd7f9e95c35bcec0256c20afe63cd874cd3f2f

    SHA256

    9d50b0b88510f0b94ab1b8f57afbc7b3833845bb0308a6bc08fed2ade806b00a

    SHA512

    19cd2c65677a616722fbd597f6a721b169f0e641e2d9414ca4515ef65ccb8e779b3cea5c0cef535fa9a9198fcf6e51776197c1bb61c16c999e3a20f7cb926e14

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\ifokgpmppbbjekpnbbdphkeblgbbbefb\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\ifokgpmppbbjekpnbbdphkeblgbbbefb\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\ifokgpmppbbjekpnbbdphkeblgbbbefb\manifest.json

    Filesize

    504B

    MD5

    ca71531077282b00569dede16f36fc7d

    SHA1

    1c782cba630980c2d247331b86bd9d9662c1ef21

    SHA256

    e19315d36bdccc7ea298f9f8a1a25280508ce83c97107e9ed4dc8f810ff3f055

    SHA512

    40321822025a6d9cf417a122a1f98bba759f74b90c7375d3a8429a8834e512e480f1a52dbb73bb94be9dd7dc6531f928dd0089067c20415fbebb90fbc4c81d27

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\ifokgpmppbbjekpnbbdphkeblgbbbefb\sqlite.js

    Filesize

    1KB

    MD5

    19d9684712c2c32dad0cb0de705fe399

    SHA1

    b103b059868a90c40e446480e018cc9669a241e5

    SHA256

    f896780383ea967bbaf40a8207599fe4ca990281422e142893a13b3580e97fd9

    SHA512

    c80994fc2328d1ec3035d436ff0a86cb775a728b92959a618f466ee7477d4bd4d70d92865ed43684458d3068244bf71dc04aed9f63ac4d15764e11e38aead928

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\ifokgpmppbbjekpnbbdphkeblgbbbefb\t_bK1YrqTR.js

    Filesize

    5KB

    MD5

    0ca03e606cc327f3bec79e3f6a360d76

    SHA1

    da75c61fa81270f3b0095f55825107bb9694fa1b

    SHA256

    3707a8bd30cddc9c605cae4a32875cab4a646268218c0737e2c92f8ace88d2d2

    SHA512

    c35890558fb18b9791ce5a9024159e617caad8b0981e8e0417fa2fbd223c5010a4a600a7b2f01472d2d294ec8ea67d30e484ed99db08930b7160463c4e8ed533

  • C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\settings.ini

    Filesize

    7KB

    MD5

    b0272d3546b36901aa1c0424980ab290

    SHA1

    54acc7f7110909664bdc4982dc467d59f9b7e9fb

    SHA256

    32e0c52155963ebd02447a4f7077b2359fac4eb49fdb4f01c3a6abd5d4537be4

    SHA512

    e375683d46a0a816f76482381c1a80d0b92e4f367b6a7109e9b93d07039bd16493459baea342471183bd752659cc32fdbf643ab933a2ae952e6f8c37eced3de5