Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-04-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
7896ce09d6bf3dcb6d233fcee51d306f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7896ce09d6bf3dcb6d233fcee51d306f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/yhrbectux.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/yhrbectux.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/yhrbectux.dll
-
Size
30KB
-
MD5
96112d00de78e6a6f7c9cd3b347ddd57
-
SHA1
98a2f0bfd0f72c1039bac854f7b0b1b889e89104
-
SHA256
73202aaad90d8e0f99ba6715b0fb8e35fd20368acf996e6c795301b4a421a1d2
-
SHA512
af0aeb2ae5881764e320777dab092ef66fd6cfbcf0de269c2bc47c7a429517502398c9340eadc15501af5f270d5e56f4f6ae169bdcc8e87c08642241fb119825
-
SSDEEP
768:May1uE0bONcu+4p7Hw/pXxH8KZm5f7pZwr:MaIh0bi5+g7HexHIZw
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
Processes:
resource yara_rule behavioral3/memory/2152-4-0x0000000000400000-0x0000000000457000-memory.dmp family_snakekeylogger behavioral3/memory/2152-8-0x0000000000400000-0x0000000000457000-memory.dmp family_snakekeylogger behavioral3/memory/2152-11-0x0000000000400000-0x0000000000457000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 5 2152 rundll32.exe 7 2152 rundll32.exe 9 2152 rundll32.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org 6 freegeoip.app 7 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1524 set thread context of 2152 1524 rundll32.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 2152 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 2152 rundll32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
rundll32.exerundll32.exerundll32.exedescription pid process target process PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1556 wrote to memory of 1524 1556 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2152 1524 rundll32.exe rundll32.exe PID 2152 wrote to memory of 2652 2152 rundll32.exe dw20.exe PID 2152 wrote to memory of 2652 2152 rundll32.exe dw20.exe PID 2152 wrote to memory of 2652 2152 rundll32.exe dw20.exe PID 2152 wrote to memory of 2652 2152 rundll32.exe dw20.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\yhrbectux.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\yhrbectux.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\yhrbectux.dll,#13⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 14644⤵PID:2652
-
-
-