Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 16:25

General

  • Target

    0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe

  • Size

    608KB

  • MD5

    0a6fcc4627e486c6cd85957c3694ccd5

  • SHA1

    442c0a15ba8a2277bfc0f96523014a0409eb7df8

  • SHA256

    05ffd4250cdb4aa6a1e05dc2db5a0c293f2ab7fcfd39ee493bd66098ad0411ca

  • SHA512

    31ec2db7a9a10168f43d138efee94fb6c2fc3f5c2fbdc550e634f96867ea7a824a5c5a8589721e45014e60bb6dc4c246f1c2a717446b8b28b7d14a425f22d35e

  • SSDEEP

    12288:E5hvBUZ/QYRHB2vyJn7qg52pGw4qhnkkUC41Fa0:qpUCYxWm79GJkkF

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.africa-eco-resp.com
  • Port:
    587
  • Username:
    hmutombo@africa-eco-resp.com
  • Password:
    Hubert@2018

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UgZGwrv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFBFF.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:380
    • C:\Users\Admin\AppData\Local\Temp\0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe"
      2⤵
        PID:8
      • C:\Users\Admin\AppData\Local\Temp\0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\0a6fcc4627e486c6cd85957c3694ccd5_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        PID:3888
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1692

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Scheduled Task/Job

      1
      T1053

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3172-8-0x00000000059A0000-0x00000000059B0000-memory.dmp
        Filesize

        64KB

      • memory/3172-20-0x0000000074E40000-0x00000000755F0000-memory.dmp
        Filesize

        7.7MB

      • memory/3172-0-0x0000000074E40000-0x00000000755F0000-memory.dmp
        Filesize

        7.7MB

      • memory/3172-3-0x00000000059E0000-0x0000000005A72000-memory.dmp
        Filesize

        584KB

      • memory/3172-4-0x00000000059A0000-0x00000000059B0000-memory.dmp
        Filesize

        64KB

      • memory/3172-5-0x00000000059B0000-0x00000000059BA000-memory.dmp
        Filesize

        40KB

      • memory/3172-6-0x0000000007320000-0x0000000007338000-memory.dmp
        Filesize

        96KB

      • memory/3172-7-0x0000000074E40000-0x00000000755F0000-memory.dmp
        Filesize

        7.7MB

      • memory/3172-2-0x0000000005F90000-0x0000000006534000-memory.dmp
        Filesize

        5.6MB

      • memory/3172-1-0x0000000000F50000-0x0000000000FEE000-memory.dmp
        Filesize

        632KB

      • memory/3172-9-0x0000000007660000-0x00000000076FC000-memory.dmp
        Filesize

        624KB

      • memory/3172-10-0x00000000077C0000-0x0000000007820000-memory.dmp
        Filesize

        384KB

      • memory/3888-24-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/3888-19-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/3888-18-0x0000000074E40000-0x00000000755F0000-memory.dmp
        Filesize

        7.7MB

      • memory/3888-21-0x0000000004D40000-0x0000000004D58000-memory.dmp
        Filesize

        96KB

      • memory/3888-22-0x0000000005B90000-0x0000000005BF6000-memory.dmp
        Filesize

        408KB

      • memory/3888-23-0x0000000074E40000-0x00000000755F0000-memory.dmp
        Filesize

        7.7MB

      • memory/3888-16-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB