Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe
-
Size
858KB
-
MD5
2ea15aa68317ad61bdcff453f0750281
-
SHA1
10bfcd418e65f26a49f8c8c589352872d32d0492
-
SHA256
20351bfb18a4c774795e240a1a143754493ce9c89edf007c5cb110e4bce447a9
-
SHA512
5b92dfebaffc4c4fefd0ea0bbd85f6add5480f4039d5b940e26c2ade527719e73acf77302bf5853864d7ed0243af09b2f15b58312d1c0a6f62e6bae29c01b7e8
-
SSDEEP
12288:pwEgszmNH4u9LS4NXZeCogcQv6QE2Fxov/G6Y:sfngCogcQyQE2Fxa/a
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
restd.xyz - Port:
587 - Username:
[email protected] - Password:
gg@6{ZL65h,* - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-5-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2172-6-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2172-8-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2172-10-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2172-12-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2172-14-0x0000000000B80000-0x0000000000BC0000-memory.dmp family_snakekeylogger -
Executes dropped EXE 1 IoCs
Processes:
dfxzdg.exepid process 2564 dfxzdg.exe -
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app 8 checkip.dyndns.org 10 freegeoip.app 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exedfxzdg.exedescription pid process target process PID 1932 set thread context of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 2564 set thread context of 2884 2564 dfxzdg.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2528 2172 WerFault.exe vbc.exe 1940 2884 WerFault.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2520 schtasks.exe 676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exevbc.exepid process 2172 vbc.exe 2884 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exevbc.exedfxzdg.exevbc.exedescription pid process Token: SeDebugPrivilege 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe Token: SeDebugPrivilege 2172 vbc.exe Token: SeDebugPrivilege 2564 dfxzdg.exe Token: SeDebugPrivilege 2884 vbc.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.execmd.exevbc.exetaskeng.exedfxzdg.execmd.exevbc.exedescription pid process target process PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2172 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1932 wrote to memory of 2956 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 2956 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 2956 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 2956 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 3064 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 3064 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 3064 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1932 wrote to memory of 3064 1932 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 2956 wrote to memory of 2520 2956 cmd.exe schtasks.exe PID 2956 wrote to memory of 2520 2956 cmd.exe schtasks.exe PID 2956 wrote to memory of 2520 2956 cmd.exe schtasks.exe PID 2956 wrote to memory of 2520 2956 cmd.exe schtasks.exe PID 2172 wrote to memory of 2528 2172 vbc.exe WerFault.exe PID 2172 wrote to memory of 2528 2172 vbc.exe WerFault.exe PID 2172 wrote to memory of 2528 2172 vbc.exe WerFault.exe PID 2172 wrote to memory of 2528 2172 vbc.exe WerFault.exe PID 2720 wrote to memory of 2564 2720 taskeng.exe dfxzdg.exe PID 2720 wrote to memory of 2564 2720 taskeng.exe dfxzdg.exe PID 2720 wrote to memory of 2564 2720 taskeng.exe dfxzdg.exe PID 2720 wrote to memory of 2564 2720 taskeng.exe dfxzdg.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 2884 2564 dfxzdg.exe vbc.exe PID 2564 wrote to memory of 1952 2564 dfxzdg.exe cmd.exe PID 2564 wrote to memory of 1952 2564 dfxzdg.exe cmd.exe PID 2564 wrote to memory of 1952 2564 dfxzdg.exe cmd.exe PID 2564 wrote to memory of 1952 2564 dfxzdg.exe cmd.exe PID 1952 wrote to memory of 676 1952 cmd.exe schtasks.exe PID 1952 wrote to memory of 676 1952 cmd.exe schtasks.exe PID 1952 wrote to memory of 676 1952 cmd.exe schtasks.exe PID 1952 wrote to memory of 676 1952 cmd.exe schtasks.exe PID 2564 wrote to memory of 1212 2564 dfxzdg.exe cmd.exe PID 2564 wrote to memory of 1212 2564 dfxzdg.exe cmd.exe PID 2564 wrote to memory of 1212 2564 dfxzdg.exe cmd.exe PID 2564 wrote to memory of 1212 2564 dfxzdg.exe cmd.exe PID 2884 wrote to memory of 1940 2884 vbc.exe WerFault.exe PID 2884 wrote to memory of 1940 2884 vbc.exe WerFault.exe PID 2884 wrote to memory of 1940 2884 vbc.exe WerFault.exe PID 2884 wrote to memory of 1940 2884 vbc.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 14963⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {0CFB3A58-4538-4AD0-BED3-07AA52B6AF6F} S-1-5-21-2610426812-2871295383-373749122-1000:UEITMFAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeC:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 14884⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeFilesize
858KB
MD52ea15aa68317ad61bdcff453f0750281
SHA110bfcd418e65f26a49f8c8c589352872d32d0492
SHA25620351bfb18a4c774795e240a1a143754493ce9c89edf007c5cb110e4bce447a9
SHA5125b92dfebaffc4c4fefd0ea0bbd85f6add5480f4039d5b940e26c2ade527719e73acf77302bf5853864d7ed0243af09b2f15b58312d1c0a6f62e6bae29c01b7e8
-
memory/1932-0-0x0000000000A00000-0x0000000000ADC000-memory.dmpFilesize
880KB
-
memory/1932-1-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/1932-2-0x0000000004360000-0x00000000043A0000-memory.dmpFilesize
256KB
-
memory/1932-20-0x0000000004360000-0x00000000043A0000-memory.dmpFilesize
256KB
-
memory/1932-17-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2172-14-0x0000000000B80000-0x0000000000BC0000-memory.dmpFilesize
256KB
-
memory/2172-3-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-8-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-10-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-12-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-13-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2172-6-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-5-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-4-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2172-7-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2172-30-0x0000000000B80000-0x0000000000BC0000-memory.dmpFilesize
256KB
-
memory/2172-24-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2564-23-0x0000000000670000-0x00000000006B0000-memory.dmpFilesize
256KB
-
memory/2564-22-0x0000000001280000-0x000000000135C000-memory.dmpFilesize
880KB
-
memory/2564-21-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2564-37-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2884-36-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2884-38-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB