Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 16:43
Behavioral task
behavioral1
Sample
eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe
-
Size
416KB
-
MD5
eb85c8d233bbc43b89d451aa8980218e
-
SHA1
e182f64c338e843fe492949ed6011a2492849013
-
SHA256
2e1064e3bd2d37cd96495c01f326d4a543b77e38045a983e93e99a4704df206f
-
SHA512
0173784e53521d4a789d69330e241b05cc14e7c27cb7559dc7be65296c5d27bbae4ff9c17f46878ee9654f8f05c116663cab24aa206ebe3943cda02e85bfd335
-
SSDEEP
6144:XNqXQgfMkh5eWDbhj4uhxGdkrpNJfet3Agp0q9ygbX+1RzDU8:9qXQgUk5d44xGONJsaMJcR/V
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1711224512:AAG22Nlr-jO4MyOqR-e8u_WyFQ4Bw7rDtVw/sendMessage?chat_id=1640241476
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Executes dropped EXE 1 IoCs
pid Process 2916 AgileDotNetProtector.exe -
Loads dropped DLL 1 IoCs
pid Process 2300 eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2300-0-0x0000000000F80000-0x0000000000FEE000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 freegeoip.app 7 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AgileDotNetProtector.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AgileDotNetProtector.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2916 AgileDotNetProtector.exe 2916 AgileDotNetProtector.exe 2916 AgileDotNetProtector.exe 2916 AgileDotNetProtector.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe Token: SeDebugPrivilege 2916 AgileDotNetProtector.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2916 2300 eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2916 2300 eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2916 2300 eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2916 2300 eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\AgileDotNetProtector.exe"C:\Users\Admin\AppData\Local\Temp\AgileDotNetProtector.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD50273f470f69e65f8daf2d941a758e244
SHA1541eaed915315e04b004c547ef35d6aab5e51eed
SHA256c1d8695dd3ba81fb11577f050e032b5080716d69c61f410314221f5794c930ba
SHA512789f2949545fe711a4c2fff029b17e0f2edea0541b764991583f4cac91faadc207ce608887bf6b6f7ac92f680c32aa2a9e1e5d95b27706fbc603b062b1cdc842
-
Filesize
225B
MD5ada862d4262f99cb0e56f20723ee83f9
SHA17aa243ffb3f12b2ff54eedbb67ad42d4ceaf253c
SHA25653c0d85f26b02c5c89a3e1eae810899d67f58c908604feee6da9471526f10f43
SHA5120ede6ddfdb4887a506342fe625cac0a18cb0816d02ee2ba75e522787e375fb7e018a625c4d206931d04715ca2774eb0c2cfa5c729c99ba9c62a84f258cdd3bab
-
Filesize
439B
MD55d4855042c97a91fc3552b306b23ad8f
SHA10a9b19796b494ee31225e539d7149905f6ab64cb
SHA2565063d036c776c400d25b9be082d71ed8ae17cd82f25e4303096388a3a625b0bf
SHA512522d72b8af77eff44589a477ce10368637d7a469f870cecc55871067d584da3cbc197091141fc196102006d5cbc82e676788be46d0a60c0d4b5e8674a5461563
-
Filesize
141KB
MD5e8641f344213ca05d8b5264b5f4e2dee
SHA196729e31f9b805800b2248fd22a4b53e226c8309
SHA25685e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
SHA5123130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109