Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/czqp.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/czqp.dll
Resource
win10v2004-20240226-en
General
-
Target
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe
-
Size
341KB
-
MD5
0a311b59eeabc0a3504ba54bb1fd8a62
-
SHA1
82b2e5f18c5ff7af38d4ae28d7ff6b8b39767390
-
SHA256
df5039197d98afa27ede1f1a8de46052de7ae716fd87d68b949b87649014b366
-
SHA512
07575a8cbae1ce9cb6d41c30663cada9394c1ad57fb662544f7196ccec727c7c3b30761ae27c030cf7c8490e50e53cc65e122023a21cb8e701e72083052307dd
-
SSDEEP
6144:GBlL/VGeKGDuGyGNQZLRQdsbZOwXP7YWx8O/6Rvh4K90iPxmJj36Xsw5r:EmBR4uOJWWO/zgxm2s2r
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2524-8-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/2524-10-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/2524-11-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/2524-12-0x0000000001F20000-0x0000000001F5C000-memory.dmp family_agenttesla behavioral1/memory/2524-14-0x00000000044F0000-0x0000000004530000-memory.dmp family_agenttesla behavioral1/memory/2524-16-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Loads dropped DLL 1 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exepid process 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exedescription pid process target process PID 2040 set thread context of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exepid process 2524 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 2524 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2524 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exedescription pid process target process PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe PID 2040 wrote to memory of 2524 2040 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
outlook_office_path 1 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe -
outlook_win_path 1 IoCs
Processes:
0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a311b59eeabc0a3504ba54bb1fd8a62_JaffaCakes118.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nst1076.tmp\czqp.dllFilesize
24KB
MD5d4e1b723e7687c5c404bc81cfce6a5ec
SHA1dd6d741f860eb6ee59aab7455d895c2e0f394a55
SHA256ae58d3fdef96fa5a1525a7ced314231b4883ed796fe8a42958d5bf24b21fa64d
SHA512359c32988a018748b157fa93f38c6ef92b28508cbf86ca129218848679b009fa630d31198ce85d9c31e8815c24aeb8be428c1e882cf67936df8a85bd542d8a3c
-
memory/2524-8-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2524-10-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2524-11-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2524-13-0x00000000740E0000-0x00000000747CE000-memory.dmpFilesize
6.9MB
-
memory/2524-12-0x0000000001F20000-0x0000000001F5C000-memory.dmpFilesize
240KB
-
memory/2524-15-0x00000000044F0000-0x0000000004530000-memory.dmpFilesize
256KB
-
memory/2524-14-0x00000000044F0000-0x0000000004530000-memory.dmpFilesize
256KB
-
memory/2524-16-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2524-17-0x00000000740E0000-0x00000000747CE000-memory.dmpFilesize
6.9MB