Analysis
-
max time kernel
129s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
f3ae5084244b18b1eb956fd8729b39db
-
SHA1
50b0e84f2fc1be5c852747e721056b0b95162ecb
-
SHA256
6b45587225d63562c0ac77d9134974686ff612743ce70b0c12183970275198b4
-
SHA512
31e964428c51c120c913be3cccd092607605adf2856ef22d83424a6c71c889c7284de617df8cbbec1e9a469a8d1602148cbf5f8a9dd7e0cafc966e5156352bf7
-
SSDEEP
12288:s2MN/vK6kaQ0iN9M+LTcQQ++fNvZl2eXNPnrEdrE:00n4+LYz++fflxXN/odo
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
budgetn.xyz - Port:
587 - Username:
[email protected] - Password:
r[]w2e=V+]AV
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1052 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2264 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2264 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2264 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2264 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 30 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32 PID 1800 wrote to memory of 1052 1800 f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3ae5084244b18b1eb956fd8729b39db_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c2⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1052
-