Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2024 05:18

General

  • Target

    ef3767ef13fb990913bd5c1a6b3e096f_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ef3767ef13fb990913bd5c1a6b3e096f

  • SHA1

    9b06a00d3e5370a43e9e123235850263857f0270

  • SHA256

    8f8da0486aaad7e72a762f3c66f64a960a6f6dacbc9f21fb3567a8c0b5be48de

  • SHA512

    b2c5c8743ed94b03441404552fcf31d403344dd2546c1b72011b2053dc47b993b98d25c1635f73dfa199fc4fb180b3a3ff8a00cebeba27af1948aa058d1a167c

  • SSDEEP

    12288:wIdgdMqoYBE5gTG2DQy2KibdJBA7gsh9NXsVWgCqGum80deaARreevyq4K6mf:UmdYmCq2DsnZJBAxN8JCqG380KhvVsQ

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ayocj2018

Signatures

  • Detect ZGRat V1 34 IoCs
  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef3767ef13fb990913bd5c1a6b3e096f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef3767ef13fb990913bd5c1a6b3e096f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Pniglvimulgugfac.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Normal.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4884
    • C:\Users\Admin\AppData\Local\Temp\ef3767ef13fb990913bd5c1a6b3e096f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ef3767ef13fb990913bd5c1a6b3e096f_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:640
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4480
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_Pniglvimulgugfac.vbs

      Filesize

      136B

      MD5

      311c68a158dfff6bf4be0ca469e8e365

      SHA1

      45ba4bb07de99dd65b0a7606db053623b8661281

      SHA256

      be6f0c382365cb583292150b9ca236a7ca40651a0cbdbc8672dd51bdd532ddbf

      SHA512

      4956d0c12303a49baf2c93ea2e03b3863fdad1bbb0e081e9a6d1976a2e6fc97671057b0c6c229ac70856c8d23f94f773f2e4abbf78b7c69a2d4e0195659bd851

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xfwizojc.vre.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

      Filesize

      3KB

      MD5

      f94dc819ca773f1e3cb27abbc9e7fa27

      SHA1

      9a7700efadc5ea09ab288544ef1e3cd876255086

      SHA256

      a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

      SHA512

      72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

    • memory/640-1888-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/640-1886-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2428-71-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-37-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-5-0x0000000004CC0000-0x0000000004CCA000-memory.dmp

      Filesize

      40KB

    • memory/2428-6-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-7-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-8-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-9-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2428-10-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-11-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-12-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-13-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-14-0x0000000007B90000-0x0000000007C16000-memory.dmp

      Filesize

      536KB

    • memory/2428-15-0x0000000007F50000-0x0000000007FB8000-memory.dmp

      Filesize

      416KB

    • memory/2428-16-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-17-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-19-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-21-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-23-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-25-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-27-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-29-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-31-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-33-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-35-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-79-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-39-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-41-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-43-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-45-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-47-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-51-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-49-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-53-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-55-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-57-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-59-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-61-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-63-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-77-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-1838-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2428-69-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-3-0x0000000004D20000-0x0000000004DB2000-memory.dmp

      Filesize

      584KB

    • memory/2428-73-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-75-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-65-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-4-0x0000000004E70000-0x0000000004E80000-memory.dmp

      Filesize

      64KB

    • memory/2428-67-0x0000000007F50000-0x0000000007FB3000-memory.dmp

      Filesize

      396KB

    • memory/2428-0-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2428-1-0x00000000001E0000-0x00000000002F4000-memory.dmp

      Filesize

      1.1MB

    • memory/2428-2-0x0000000005230000-0x00000000057D4000-memory.dmp

      Filesize

      5.6MB

    • memory/4196-1898-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4196-1840-0x0000000005B50000-0x0000000005BA6000-memory.dmp

      Filesize

      344KB

    • memory/4196-1881-0x0000000009420000-0x0000000009428000-memory.dmp

      Filesize

      32KB

    • memory/4196-1885-0x0000000005B40000-0x0000000005B50000-memory.dmp

      Filesize

      64KB

    • memory/4196-1912-0x0000000005B40000-0x0000000005B50000-memory.dmp

      Filesize

      64KB

    • memory/4196-1835-0x0000000000400000-0x0000000000484000-memory.dmp

      Filesize

      528KB

    • memory/4196-1902-0x0000000005B40000-0x0000000005B50000-memory.dmp

      Filesize

      64KB

    • memory/4196-1839-0x0000000005B40000-0x0000000005B50000-memory.dmp

      Filesize

      64KB

    • memory/4196-1836-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4196-1837-0x0000000005860000-0x00000000058FC000-memory.dmp

      Filesize

      624KB

    • memory/4480-1911-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/4480-1903-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/4884-1846-0x00000000057E0000-0x0000000005802000-memory.dmp

      Filesize

      136KB

    • memory/4884-1889-0x0000000007F60000-0x0000000007FF6000-memory.dmp

      Filesize

      600KB

    • memory/4884-1860-0x0000000006990000-0x00000000069DC000-memory.dmp

      Filesize

      304KB

    • memory/4884-1863-0x0000000005450000-0x0000000005460000-memory.dmp

      Filesize

      64KB

    • memory/4884-1876-0x0000000006F10000-0x0000000006F2E000-memory.dmp

      Filesize

      120KB

    • memory/4884-1842-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4884-1858-0x00000000063F0000-0x0000000006744000-memory.dmp

      Filesize

      3.3MB

    • memory/4884-1864-0x000000007F290000-0x000000007F2A0000-memory.dmp

      Filesize

      64KB

    • memory/4884-1877-0x0000000007B30000-0x0000000007BD3000-memory.dmp

      Filesize

      652KB

    • memory/4884-1878-0x00000000082D0000-0x000000000894A000-memory.dmp

      Filesize

      6.5MB

    • memory/4884-1848-0x0000000006140000-0x00000000061A6000-memory.dmp

      Filesize

      408KB

    • memory/4884-1879-0x0000000007C80000-0x0000000007C9A000-memory.dmp

      Filesize

      104KB

    • memory/4884-1880-0x0000000007CF0000-0x0000000007CFA000-memory.dmp

      Filesize

      40KB

    • memory/4884-1859-0x0000000005640000-0x000000000565E000-memory.dmp

      Filesize

      120KB

    • memory/4884-1847-0x0000000005980000-0x00000000059E6000-memory.dmp

      Filesize

      408KB

    • memory/4884-1890-0x0000000007C00000-0x0000000007C11000-memory.dmp

      Filesize

      68KB

    • memory/4884-1891-0x0000000007C30000-0x0000000007C3E000-memory.dmp

      Filesize

      56KB

    • memory/4884-1892-0x0000000007EC0000-0x0000000007ED4000-memory.dmp

      Filesize

      80KB

    • memory/4884-1893-0x0000000007F10000-0x0000000007F2A000-memory.dmp

      Filesize

      104KB

    • memory/4884-1894-0x0000000007F00000-0x0000000007F08000-memory.dmp

      Filesize

      32KB

    • memory/4884-1897-0x0000000074C10000-0x00000000753C0000-memory.dmp

      Filesize

      7.7MB

    • memory/4884-1866-0x0000000070520000-0x000000007056C000-memory.dmp

      Filesize

      304KB

    • memory/4884-1844-0x0000000005450000-0x0000000005460000-memory.dmp

      Filesize

      64KB

    • memory/4884-1845-0x0000000005A90000-0x00000000060B8000-memory.dmp

      Filesize

      6.2MB

    • memory/4884-1843-0x0000000005450000-0x0000000005460000-memory.dmp

      Filesize

      64KB

    • memory/4884-1865-0x0000000006F30000-0x0000000006F62000-memory.dmp

      Filesize

      200KB

    • memory/4884-1841-0x0000000005300000-0x0000000005336000-memory.dmp

      Filesize

      216KB