Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 09:07

General

  • Target

    1ab5be69686de3fb42cb06636b69bc7d_JaffaCakes118.exe

  • Size

    313KB

  • MD5

    1ab5be69686de3fb42cb06636b69bc7d

  • SHA1

    0fcca8d5843b800b25154eb586a66fa13bedc2b8

  • SHA256

    70aac187b0093d215a4f31fcb78c312fce4385916373f12aec26adcee2ce0905

  • SHA512

    f8ab6f61036f46dea3a6b79b0fef7b5d0f0e6c69d8b14dce38f6546dc829b19e61797d8b050a395d70baa9ff67c5f6d510032add7223340b367daf36cce2c284

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4skKxQOKkEdZRjzNniVt7VcAhR0Gy45AmFRP:91OgLdaYQ3rd7zl8YAbUyAMP

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ab5be69686de3fb42cb06636b69bc7d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ab5be69686de3fb42cb06636b69bc7d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:2712

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Codecv\uninstall.exe
    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\chrome.manifest
    Filesize

    114B

    MD5

    568ad4b87fbdbc16f0c0f648f2d7b558

    SHA1

    58da5d70167549c47ac1f86f306a82238df49c1d

    SHA256

    00a1f69fafffdb1e78dfaae1fae614219bdb5a167a729db30155fda54debe7db

    SHA512

    a59951992c7c1279f156ec1672146675a8a78df09e1394e6c469ae993e50f5d179081b0cd0b0c972b6161b3da4a1a7e884f792a3169a1e75fa2a09e57964bd6a

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\indexeddb.js
    Filesize

    1KB

    MD5

    eba390d6d8dfadb4697102fcb5cb0da6

    SHA1

    2a695acfdd2cabb1c4406f44e3e3bbfbaf9d6e6a

    SHA256

    0baa3e7f79f073e2519f0a5b8e275d98cf9ee33fd66a27a7af0c7470edace536

    SHA512

    01aac8d0d2e0ddb2750776eb281c28eb8e69b161292afba44894184a0062ffe6ca91f610c1ad19dfb223ca7cbec69dee03a956054cf361504742d45bc8b5e5b4

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\jquery.js
    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\jsext.js
    Filesize

    6KB

    MD5

    639ceeacd0e104aeaeecd766ab770323

    SHA1

    35b822aef51bd30de854d8a5531ce08009decb66

    SHA256

    f12ba6ebd6e6cc5bcce44eddb35aa7e3d0da984081e982563ab2133fd9e53eae

    SHA512

    78f0cbc5be72f27dac13af0ff2112e13913787f85caab62b8efe3f9cc049c7781b66ae22ccb8fe3ee2373d5330e15879b3e12dd44bfd488d0e78fa52835b26df

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\lsdb.js
    Filesize

    1KB

    MD5

    fe6ce8cd76a153f0ad3b59e002dda246

    SHA1

    10dbd3ea225b75a29d41e52ffb3d0e43a32e5c11

    SHA256

    5b42d923b1fffcc56a15cc067913e186e7c5487b5cfe1b7cdc55003baa1a3f13

    SHA512

    fa3cbf1165442c5e1de859d6c7ff827177e7f817050ff4a3b82795c29c5eba16040438d853b0eae9b39907b2aa39d9d6f9697e66b71a12ecacefbbd965140ef0

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\prfdb.js
    Filesize

    1KB

    MD5

    49beff95fc2bf268f454c32ff8eef4c7

    SHA1

    830d6de3e531f4aa1c65551b115272d19cd52783

    SHA256

    a1e387652764103326d3e5eb40b3077d11c3ce377c29c81bf52415ea7715ea92

    SHA512

    bfbfcd7d00c09fdf930d845e8c026cb50a56d00d522903e0f9b95855c81f9fd5d620cce8e9a1126d378eb03c932c414d08f227ec2e8269e09b3c4f86c8495dda

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\sqlite.js
    Filesize

    1KB

    MD5

    d3521eb238d6dbe9c2bab4bdb23ed0b4

    SHA1

    12036a12910f0292db55b49f726583b792564ba6

    SHA256

    b89dc60d93c652348ae441f968e81e13c84efd7377d1909ae790cfad970a8c25

    SHA512

    22a4c5ec9f75d2f62259d255190e8b1cd0805e62a0bebfb8982914221c5694da2a7ee2172aa4e2135cc7ead0cc728adda907a7fb7d2a9a0db7a093d8d97e4178

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\content\wx.xul
    Filesize

    228B

    MD5

    8ab068c2581578dd69ea2d82f8bbcfef

    SHA1

    a8ccef8e501a143bf0da5c14aabbd30545ec4cc5

    SHA256

    5080aaa0ac0d372d271a41cc5e1a0b390fd78c9f3b2fda894fddf2f32f1deb63

    SHA512

    7546c85153ecd527416a839bd70372814a3cc7c53a9f1d9d3b3eb396cb11b75a183c3e033c56211c785f85964b54300c9e6ff66f58cf3779734658e146fe2afa

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\[email protected]\install.rdf
    Filesize

    676B

    MD5

    f2874421631b0fa158157cfedbd7fa9f

    SHA1

    b7c4ed7874aeceb9c833f31d9ac25533528eb71c

    SHA256

    8cb5bda3c3731053e2e994a494ebd244866b179e2fd354638383e05ee24c4e7f

    SHA512

    e8bd3ecb00a9e5cb0afe1af46b28f5a2969faf9442a6f82b683f0a7e4e278aab48588f66d9997ff0d597a851b94b3b01e4c2fa689d11fa0ea9465834176f34ca

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\background.html
    Filesize

    5KB

    MD5

    44abe0192b3a6bf226e80c9fd0e8398e

    SHA1

    e8e5924fe79dca8935c0e694d24ae6a08b77db72

    SHA256

    f3afd269548514916d952b5c5c2dc55f3a5baed8ae6c77426627835fd1e55119

    SHA512

    a0f9d3861c5e31f766fe4dedb779be397ab121bdbd888011fab5fdc14445f859e2b3ad4d2d71bcd3a00964ae572c995edc6f6acf955e8e807d6ceaac2fe12a8e

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\bhoclass.dll
    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\content.js
    Filesize

    734B

    MD5

    60361dfd2711ba40256a8edd4873d1ed

    SHA1

    b8f70f6eb5047bc5ba282a823fcc1716ca3612f3

    SHA256

    c1d01f1d6bc9b8533eb4353523f4f8dcb3f8b394cc091a43fd8a17dd3915cd75

    SHA512

    efe542c116992bb6ef8da22ebbd055c7ed5681e23a3547730b04c66755e330c409782144cb78cd21a58f2c9ce08c66791acfe49e9702c19671ab14a5db6f62e5

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\dpemkhchjekgekebcjpogkngfhbbppcl.crx
    Filesize

    37KB

    MD5

    438203adb3deb9bad7347225886e8f51

    SHA1

    5c747e33c14d389486dc4d5fffd1abf9f85664ed

    SHA256

    6c660f7665e3e2ece5f555af1e983126a29471a2671bc26207ff260c8e1cf492

    SHA512

    63545f678e59bad7d2636816112198abb9c2f782058ef5c9cd6bed48ed0cc86fde4bcd884c135241e37bbaa5932c5d9802c36052e83be3690ae8a5ba1245e505

  • C:\Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\settings.ini
    Filesize

    603B

    MD5

    afb8ee350e7ec2cfbe79812756e3734a

    SHA1

    11aeed8c2ed3ddcd01a5fc83ded79d6edca769fc

    SHA256

    1b7639418cbd9cfd7aa2c947d3b9c7d5f75199e17fa3dd48fb3baf2fd094d593

    SHA512

    d7bb3eb8961fdd65177d6e46a1ee4bed4b6d68e2b1e3292dbf5f211ddbb38e40a84a60fda435663e6aea259cd9ff6c67dc210719354ee48d27b31742d31e6e51

  • \Users\Admin\AppData\Local\Temp\7zS1B0F.tmp\setup.exe
    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b