Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
f2ab46c4d6035194f6bb1a3fde6ba2ae
-
SHA1
2db4d8e0ca62631d75302c0cd5c509c2158be5b1
-
SHA256
1b808f880f3ce7f3f2206b471efc9ae4655bf7cc69da90f1191cb5e1926517eb
-
SHA512
32454c0f23c02977a8016fc9cd372dc2943d86ea7f54f88d5f5d78df97aeb3a8443fad407f48820e918c02fea722bcb1dc386a4b3aa5d53c0474ea7a022846d6
-
SSDEEP
24576:8aS/d3xKzksLksqeSj3hEuXpastDNaRLbkkKzFZ/y8jh8N6ZN8Z:qKVSj5ZtDNaRLoH/+N6ZN8
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.ccmainoffice.com - Port:
587 - Username:
[email protected] - Password:
QAZqaz123@ - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2924-12-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/2804-7-0x0000000005A50000-0x0000000005A62000-memory.dmp CustAttr -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 checkip.dyndns.org 25 freegeoip.app 26 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exedescription pid process target process PID 2804 set thread context of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1672 2924 WerFault.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exef2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exepid process 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe 2924 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exef2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe Token: SeDebugPrivilege 2924 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exedescription pid process target process PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe PID 2804 wrote to memory of 2924 2804 f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 18083⤵
- Program crash
PID:1672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2924 -ip 29241⤵PID:3156
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f2ab46c4d6035194f6bb1a3fde6ba2ae_JaffaCakes118.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3