Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
fa0a3ed04eec65d6d3fb55aa7d2497c1
-
SHA1
89aafe0cfec4ecc13fd7f255b1e6e8af903ddbd0
-
SHA256
2c6df9a84b482c1dd1af8ee142ccdfeab23234a8507f3cc637aee9161a6c58b8
-
SHA512
da69f632f0bc9789bf17d1cfdbf09c991098227a23e3bd273c1c5720b53d9eb81b99c0121f632cbc2eb25ece51e6548470dc2fd0ed64d37f88a58a005b1c7b3d
-
SSDEEP
24576:inGai6Dban0+uhHJQNmj3X2rhK1+pSRs/8Mz3g:T6iuNH261Rs/
Malware Config
Signatures
-
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4032-23-0x0000000000350000-0x00000000003D8000-memory.dmp MailPassView behavioral2/memory/3964-32-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3964-34-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3964-35-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/3964-37-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4032-23-0x0000000000350000-0x00000000003D8000-memory.dmp WebBrowserPassView behavioral2/memory/216-38-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/216-40-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/216-41-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/216-48-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 9 IoCs
resource yara_rule behavioral2/memory/4032-23-0x0000000000350000-0x00000000003D8000-memory.dmp Nirsoft behavioral2/memory/3964-32-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3964-34-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3964-35-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/3964-37-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/216-38-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/216-40-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/216-41-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/216-48-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 4032 InstallUtil.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1444-8-0x0000000007210000-0x0000000007238000-memory.dmp agile_net behavioral2/memory/1444-11-0x00000000057D0000-0x00000000057E0000-memory.dmp agile_net -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 whatismyipaddress.com 42 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1444 set thread context of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 4032 set thread context of 3964 4032 InstallUtil.exe 93 PID 4032 set thread context of 216 4032 InstallUtil.exe 94 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 216 vbc.exe 216 vbc.exe 4032 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe Token: SeDebugPrivilege 4032 InstallUtil.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 1444 wrote to memory of 4032 1444 fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe 91 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 3964 4032 InstallUtil.exe 93 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94 PID 4032 wrote to memory of 216 4032 InstallUtil.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:3964
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196