Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe
-
Size
858KB
-
MD5
2ea15aa68317ad61bdcff453f0750281
-
SHA1
10bfcd418e65f26a49f8c8c589352872d32d0492
-
SHA256
20351bfb18a4c774795e240a1a143754493ce9c89edf007c5cb110e4bce447a9
-
SHA512
5b92dfebaffc4c4fefd0ea0bbd85f6add5480f4039d5b940e26c2ade527719e73acf77302bf5853864d7ed0243af09b2f15b58312d1c0a6f62e6bae29c01b7e8
-
SSDEEP
12288:pwEgszmNH4u9LS4NXZeCogcQv6QE2Fxov/G6Y:sfngCogcQyQE2Fxa/a
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
restd.xyz - Port:
587 - Username:
[email protected] - Password:
gg@6{ZL65h,* - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1284-6-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exedfxzdg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation dfxzdg.exe -
Executes dropped EXE 1 IoCs
Processes:
dfxzdg.exepid process 1144 dfxzdg.exe -
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 checkip.dyndns.org 44 freegeoip.app 45 freegeoip.app -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exedfxzdg.exedescription pid process target process PID 1484 set thread context of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1144 set thread context of 4512 1144 dfxzdg.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5108 1284 WerFault.exe vbc.exe 1392 4512 WerFault.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4536 schtasks.exe 2936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exevbc.exepid process 1284 vbc.exe 4512 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exevbc.exedfxzdg.exevbc.exedescription pid process Token: SeDebugPrivilege 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe Token: SeDebugPrivilege 1284 vbc.exe Token: SeDebugPrivilege 1144 dfxzdg.exe Token: SeDebugPrivilege 4512 vbc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.execmd.exedfxzdg.execmd.exedescription pid process target process PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 1284 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe vbc.exe PID 1484 wrote to memory of 4724 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1484 wrote to memory of 4724 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1484 wrote to memory of 4724 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1484 wrote to memory of 3800 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1484 wrote to memory of 3800 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 1484 wrote to memory of 3800 1484 2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe cmd.exe PID 4724 wrote to memory of 4536 4724 cmd.exe schtasks.exe PID 4724 wrote to memory of 4536 4724 cmd.exe schtasks.exe PID 4724 wrote to memory of 4536 4724 cmd.exe schtasks.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 4512 1144 dfxzdg.exe vbc.exe PID 1144 wrote to memory of 408 1144 dfxzdg.exe cmd.exe PID 1144 wrote to memory of 408 1144 dfxzdg.exe cmd.exe PID 1144 wrote to memory of 408 1144 dfxzdg.exe cmd.exe PID 1144 wrote to memory of 4380 1144 dfxzdg.exe cmd.exe PID 1144 wrote to memory of 4380 1144 dfxzdg.exe cmd.exe PID 1144 wrote to memory of 4380 1144 dfxzdg.exe cmd.exe PID 408 wrote to memory of 2936 408 cmd.exe schtasks.exe PID 408 wrote to memory of 2936 408 cmd.exe schtasks.exe PID 408 wrote to memory of 2936 408 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 14443⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\2ea15aa68317ad61bdcff453f0750281_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1284 -ip 12841⤵
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeC:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 17843⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4512 -ip 45121⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeFilesize
858KB
MD52ea15aa68317ad61bdcff453f0750281
SHA110bfcd418e65f26a49f8c8c589352872d32d0492
SHA25620351bfb18a4c774795e240a1a143754493ce9c89edf007c5cb110e4bce447a9
SHA5125b92dfebaffc4c4fefd0ea0bbd85f6add5480f4039d5b940e26c2ade527719e73acf77302bf5853864d7ed0243af09b2f15b58312d1c0a6f62e6bae29c01b7e8
-
memory/1144-25-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/1144-24-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1144-19-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/1144-18-0x0000000000A60000-0x0000000000B3C000-memory.dmpFilesize
880KB
-
memory/1144-17-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1284-12-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1284-6-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1284-8-0x0000000005A30000-0x0000000005ACC000-memory.dmpFilesize
624KB
-
memory/1284-9-0x0000000005BF0000-0x0000000005C00000-memory.dmpFilesize
64KB
-
memory/1284-7-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1484-0-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1484-14-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/1484-13-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1484-5-0x0000000005560000-0x000000000556A000-memory.dmpFilesize
40KB
-
memory/1484-4-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/1484-3-0x00000000053C0000-0x0000000005452000-memory.dmpFilesize
584KB
-
memory/1484-2-0x0000000005B40000-0x00000000060E4000-memory.dmpFilesize
5.6MB
-
memory/1484-1-0x0000000000950000-0x0000000000A2C000-memory.dmpFilesize
880KB
-
memory/4512-21-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/4512-22-0x00000000051E0000-0x00000000051F0000-memory.dmpFilesize
64KB
-
memory/4512-23-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB