Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gyyrofsvwt.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gyyrofsvwt.dll
Resource
win10v2004-20240226-en
General
-
Target
abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
abb26d1600dda55b1004b39d569178a8
-
SHA1
8e6cba40d4ddd9d6ff6b781f79febbb47e58855b
-
SHA256
1d0e997a1e0cca7446644a5082da18ea191862c85a3e222b0296bdb158c2a387
-
SHA512
8d560a240bba2f915ff5a7b05bd061cbc68c8ce2268ee8b6815834f00452232e4f63da89e8d9b565dec45f0e9df232931676caae8ac6242995d14ad1222eb3e4
-
SSDEEP
12288:Jr5aOWToieigTrpPJQ1eFm06ua4xQ4HXXjwFROQcPf/6Pk15BOVCFrMJTpSLmTwJ:x5yyRZZ324nj2RGnyatKMgGphLdPe7kR
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1838876767:AAEiDKTcT_A4WBwpMo9nnrtBP7OvsmEUnNU/sendMessage?chat_id=1300181783
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 1 IoCs
pid Process 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 624 set thread context of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2140 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28 PID 624 wrote to memory of 2140 624 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5593ae51744a3a1518c88249d88f6e0d8
SHA1799fc91d7871e4387fd487da8c066a5908263088
SHA256f5b07baf233029ae6a86a512fd84161c07d27827ef0222eea9783296249f646b
SHA51291d538a964f803b97b5983ca7bfab265cbfca1d481c9da7038d478bef56cea033cd9fc7acaf18b5a9680fb684cacab950df66fc9b4264ba8b5ed63c56e80cf6a