Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
0bec6fa8f995272581d8663786efb3b8
-
SHA1
605b6865d43ac4c32f4b3f3f4534d832509819f5
-
SHA256
46ff34ff0185ef7fa03e8e3578623ddac35e6c622fdc30f0c6501ce0467e8de0
-
SHA512
e539b510a8e62ee632dddeaa1303317185377ec8ecd269201d9999b4f02f1700b3084c3d7bce0548da1030b99dfdf26ec05c5b5f0c9086cdc0e4b960f4672a8b
-
SSDEEP
24576:qu6J33O0c+JY5UZ+XC0kGso6Fai/om/oG7a88P5r1YWY:cu0c++OCvkGs9Fai/X/BW8YlY
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
ojuks4421132
Signatures
-
404 Keylogger
Information stealer and keylogger first seen in 2019.
-
404 Keylogger Main Executable 3 IoCs
resource yara_rule behavioral1/memory/2636-5-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger behavioral1/memory/2636-9-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger behavioral1/memory/2636-7-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.js MSBuild.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Gfxv2_0.url 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 2636 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1848 2636 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2636 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2636 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2636 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2636 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2636 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2636 1664 0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe 28 PID 2636 wrote to memory of 1848 2636 MSBuild.exe 30 PID 2636 wrote to memory of 1848 2636 MSBuild.exe 30 PID 2636 wrote to memory of 1848 2636 MSBuild.exe 30 PID 2636 wrote to memory of 1848 2636 MSBuild.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bec6fa8f995272581d8663786efb3b8_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"2⤵
- Drops startup file
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 18283⤵
- Program crash
PID:1848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a