Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe
-
Size
756KB
-
MD5
338a2590962fb66ab7a2d4436c3100f8
-
SHA1
970fe9b649285cf8adfd10d42a1e06cda73b3982
-
SHA256
d4d0017b7ee338ad4c3ae0a6b9e61ed2ecb4279c1b30bd636eec2e924450bad7
-
SHA512
b88b4653c76f817388df4d1306905e96c6b6797d1d999e5a18c570c1536735bbc60ef4a34e533e061f85453bb701561207654b571be86d4ae09eddddf571b6e9
-
SSDEEP
12288:VPLTrMosq9TjxTp7+R3/pMOu3thdQrZyuwz2d:pLTrv9eR3h+
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Prince11
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2244-8-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2244-9-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2244-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2244-17-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2244-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exedescription pid process target process PID 2236 set thread context of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exedescription pid process target process PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2236 wrote to memory of 2244 2236 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe PID 2244 wrote to memory of 576 2244 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe dw20.exe PID 2244 wrote to memory of 576 2244 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe dw20.exe PID 2244 wrote to memory of 576 2244 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe dw20.exe PID 2244 wrote to memory of 576 2244 338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\338a2590962fb66ab7a2d4436c3100f8_JaffaCakes118.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3843⤵PID:576