Analysis

  • max time kernel
    139s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 09:33

General

  • Target

    19a49cee165ebebdca1e4c6612e355ef_JaffaCakes118.exe

  • Size

    315KB

  • MD5

    19a49cee165ebebdca1e4c6612e355ef

  • SHA1

    15e39acb46619f0e85228143c75d37f1bcc0850d

  • SHA256

    1047b40461a70291d33223f8cff1e4a3d84629cf41b6c9bffe108e0dda9572a5

  • SHA512

    e6f17bb8b2b86089ddd0712343c517fbe5c4d83795d311670bbdffd83f92ecdc9a3d0b51860623e4237aa08a6e4831019944171235a5e4e8bb612b0de796f0a0

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sjyIKntP0g+9o6PEC64swMyGVpUVKhAv:91OgLdaT5+9IV4BeVpUjv

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19a49cee165ebebdca1e4c6612e355ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19a49cee165ebebdca1e4c6612e355ef_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2880

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Bcool\uninstall.exe
    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\chrome.manifest
    Filesize

    114B

    MD5

    29fdfd6a385a1d73fa1845a567ecc53a

    SHA1

    29f7fb78f7337c502944091670d8107b48a988f8

    SHA256

    3911aaf983af8031cba53e5025b2537461a5c352e91c1bfbc066ffa9f9d440e2

    SHA512

    df42366018f6a663b567bb9d9b66dfae58bd29ce454204b4a196d3008735a6c9ac8dad0624a4b69914b3c46255623c8973f6fe446d53eb8c1c2f4f88f6c04f6a

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\indexeddb.js
    Filesize

    1KB

    MD5

    2511e83e44137505f6fc06c5aaf5209f

    SHA1

    f0e13e6c65189cb85ea6b258419a89411155bd22

    SHA256

    54126060d345c64a0609777cbd39b3e379a0603381c7f2df4dd195385ebfc951

    SHA512

    93e13212b4ddc238ebb1045f12a2a927c8e66bf9fef566a1f9b65820fc3ff7456fb7115a668bc6ce5027672a7e8c38723b39a4b7b4d070ec8a95e6ccb219dd3c

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\jquery.js
    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\jsext.js
    Filesize

    6KB

    MD5

    5999478c02c887acfb846cabb17aba46

    SHA1

    739e5321d2c7fe34c77814864a28119aa5be4216

    SHA256

    784236ef48d1700a9b86e62d41a98c5016c2de6a83df5a644c0f468fcafa9350

    SHA512

    8f99d610454bd28fab328f4f797423f24208588fd9b3f6bd3a9e19d63ca7837a86b12de8893ece00a15b452e6f9add5fca2a61dd2f475ff0382060c30bfc2ba7

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\lsdb.js
    Filesize

    1KB

    MD5

    c26caddae1282bbf20b00a98308b8c2d

    SHA1

    5d89aa27503c5f0bb030b9bada652299318cbd22

    SHA256

    95b6dbd93d19e376678881808ff4aec98336638eeacf017b064ece64e05bc49a

    SHA512

    dad23b96f22919bf70c6a44f6efe7d850289275865d0ceb900b08e14cbbf39deb68517379a81d19b7af873680518abdbedc4b9833fef63ddff47a2d329a543e1

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\prfdb.js
    Filesize

    1KB

    MD5

    27f1b8b8f5de950696360aca630e8311

    SHA1

    69e5c5982dfca8cb645bdb165580b963d9b87efa

    SHA256

    ac007ae76db8c3c526c0c6e04bd0d17809213317f4069c9c0243db3bb9b8c4c1

    SHA512

    836cb1275e54d9ee9ba62a68848ca27dfa2b340e22426796e49224d6432f122909b79bdd5a270aefcc5ce9b266739f6e288bee6de4bf907fcedfb8da7070db81

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\sqlite.js
    Filesize

    1KB

    MD5

    25b1efd09a87bf939a129ae9a8263ebe

    SHA1

    63bc0d1fb58e55288dc2d2a89bff01495300c42d

    SHA256

    0afe530c48531a0f69d9cab6df2ba7f714791b5419e9aaeb760d37e25d172836

    SHA512

    1de6a63ce36ee7556232859aefd95793fc72778373546b191077f9c79775b9037ee0e3268b3b8c701e9a62fab09c7528cd2f98e2cb3b2db43bf9297bbd90497a

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\content\wx.xul
    Filesize

    228B

    MD5

    ce649e879b02801cd0125fe7accf761a

    SHA1

    cb021793bab0ac02f43da79cd9052ae8b5dc9360

    SHA256

    fb1065b6314ba5bad14092fb9cd4bff05a045dd8a868477e6954b5d5be17e8a1

    SHA512

    34bfe072adb51dedfd6cd5a49c82658fd139db14765ae2c708885cb35b1c4ac96a108cb74396e3d896fecaa1ba41ea6b200745e4cc1c79f5aab8dab74a3bb32b

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\[email protected]\install.rdf
    Filesize

    668B

    MD5

    52b370976abf54b522fd09403dc71aef

    SHA1

    d2b03032ffac2ed533bd238bbcb4aefbd430d0af

    SHA256

    a45d66a4e41930d05da45ed1b13ef0c8eac68082e2a56f036ed2bca626d1e546

    SHA512

    2768a3b0bde8192e071aac9b88e5ebfcccfe6fb89bb0978f46c915c964d22f2a7556746e6c65f74a1308529e0649f7f0b514726dff9abdbc9dbc4a046390a9c4

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\background.html
    Filesize

    5KB

    MD5

    67cc3adc1dadb6bb42fc97f5ac040545

    SHA1

    60a7b25777c736459aaed832a0caf0bb64230fe4

    SHA256

    c123af53f9939f842047d61c0c71b9576bafc23ddcce6386d84ab565f79d4ece

    SHA512

    fcd3c5146b3a55845562f9d281c0cf717dd61a1aaea18d7df752e60a322a7610c58ce4c50e318b5edf8a030e00bf370152ef806f3badf2c72fe8dfbf4f762116

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\bhoclass.dll
    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\content.js
    Filesize

    386B

    MD5

    3fcec8fa38a822627d4ecf2359868c49

    SHA1

    490e2ed58feb64ff77c11047ef9345ce99068da7

    SHA256

    6b866a3fb717c3b73357309c25c0e53060addd3fc529f0662397c869155e8b89

    SHA512

    a7eac0ae9b1171c02296a1dacbc82bf1d93657d75bcc86cba7041e90d82d177f50e4366e55ffa9246e5f3d7b409e7d24f25ad4eef2dbb1b29a3ba32011a6bbb2

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\kmalmemjoapenaedckgogfojjpkjjllo.crx
    Filesize

    37KB

    MD5

    f0096617abbc52bf90c56963fa11a087

    SHA1

    0efa4d98feb32f073efaa68c66fbf9c4184e5a80

    SHA256

    d9284fea0524652a63de5f31ba0df895188e2a8638baa71b147069035a0717a4

    SHA512

    978340965791fde0c8c46cc6d608302dbb6c029ce55327b8d08a036892fba8cd5507fa354af02c09c1ea43a0ba83a7bfa8d9f00eb08ead24cb371ed9f5cc86cf

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\settings.ini
    Filesize

    592B

    MD5

    64da0b2b897f0230ae681ffdd485b162

    SHA1

    49c23fc0acfab5a445eea0be7e59175fc03cbfb4

    SHA256

    29e9f773678a5376329d34f28d27f8b7d69fe318c2c3ec268dbc1897c79b35ce

    SHA512

    fbc45cb0bcec9a96a2c2e10d265733a8f7bd985017b15ca36ead88d7808af5ad4def766a298325ff8b1e7dd47f65ffc890af1ac0274be7ed709aefd2440a75f1

  • C:\Users\Admin\AppData\Local\Temp\7zSA364.tmp\setup.exe
    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b