Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 14:52

General

  • Target

    0870fd6017b77dd109d498c4ef43b423_JaffaCakes118.exe

  • Size

    664KB

  • MD5

    0870fd6017b77dd109d498c4ef43b423

  • SHA1

    d4fa08c2063deff83e5c3673a8dbc82226f30432

  • SHA256

    eb7e1d22eeb2b0c9e6dd88d64791d07414efd3eab95ff3bf1774efef8efb5712

  • SHA512

    5af90eee7ae5a5b3488379adc1e102114a7bac8f3fdec03edd7b3f20ba014eb84d875bb7c549ec432d52f6bc0d8319b3819dfa6fc6f04abcfaf5d6c344e727b6

  • SSDEEP

    12288:N1cTJ4240Bby1Li+TuBd3X3uIIIkIxV0DT:4S29by1Li+aBd3X3B+

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    efinancet.shop
  • Port:
    587
  • Username:
    mortgage@efinancet.shop
  • Password:
    SU^QlsaPg%E#
  • Email To:
    mortgage@efinancet.shop

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0870fd6017b77dd109d498c4ef43b423_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0870fd6017b77dd109d498c4ef43b423_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Users\Admin\AppData\Local\Temp\0870fd6017b77dd109d498c4ef43b423_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0870fd6017b77dd109d498c4ef43b423_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 1484
        3⤵
        • Program crash
        PID:1836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 1248
      2⤵
      • Program crash
      PID:1556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 440 -ip 440
    1⤵
      PID:4008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4104 -ip 4104
      1⤵
        PID:4636
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:2696

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/440-0-0x0000000074C10000-0x00000000753C0000-memory.dmp
          Filesize

          7.7MB

        • memory/440-1-0x0000000000820000-0x00000000008CC000-memory.dmp
          Filesize

          688KB

        • memory/440-2-0x0000000005D60000-0x0000000006304000-memory.dmp
          Filesize

          5.6MB

        • memory/440-3-0x0000000005850000-0x00000000058E2000-memory.dmp
          Filesize

          584KB

        • memory/440-4-0x00000000057A0000-0x00000000057B0000-memory.dmp
          Filesize

          64KB

        • memory/440-5-0x0000000005810000-0x000000000581A000-memory.dmp
          Filesize

          40KB

        • memory/440-11-0x0000000074C10000-0x00000000753C0000-memory.dmp
          Filesize

          7.7MB

        • memory/4104-6-0x0000000000400000-0x0000000000426000-memory.dmp
          Filesize

          152KB

        • memory/4104-7-0x0000000074C10000-0x00000000753C0000-memory.dmp
          Filesize

          7.7MB

        • memory/4104-8-0x00000000057D0000-0x000000000586C000-memory.dmp
          Filesize

          624KB

        • memory/4104-9-0x00000000030C0000-0x00000000030D0000-memory.dmp
          Filesize

          64KB

        • memory/4104-10-0x0000000074C10000-0x00000000753C0000-memory.dmp
          Filesize

          7.7MB