Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 04:49

General

  • Target

    1188574f43ab4949dbc23b2b0c358c64_JaffaCakes118.exe

  • Size

    659KB

  • MD5

    1188574f43ab4949dbc23b2b0c358c64

  • SHA1

    71fccbdd47f6285899cf45e0ba5d532490caa8ba

  • SHA256

    0a5a8423274bf1f4ba1b90b99ef3efdadcb5459a519c47dc6ebb97a2065ead4c

  • SHA512

    93cf09dd8efbcbb353d68f0b049fca2df8f52c13a23847de24049680dcc5bd46185870db098d2c5a283a1b4f4d2a7165a3f4304c2f77447b8bb34eff8a24c723

  • SSDEEP

    6144:2NZuc+lNVaQsebRFxlh9jwrp5aTvAgT4RS3eATXModewM9O7vGmcqebCa3ems9t:2j+paxO8rSTmk3eA79s9yebCm

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 2 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1188574f43ab4949dbc23b2b0c358c64_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1188574f43ab4949dbc23b2b0c358c64_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v System64 /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Local\System64"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v System64 /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Local\System64"
        3⤵
        • Adds Run key to start application
        PID:2556
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process C:\Users\Admin\AppData\Local\System64
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\System64
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\System64"
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:1032

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\System64
    Filesize

    659KB

    MD5

    1188574f43ab4949dbc23b2b0c358c64

    SHA1

    71fccbdd47f6285899cf45e0ba5d532490caa8ba

    SHA256

    0a5a8423274bf1f4ba1b90b99ef3efdadcb5459a519c47dc6ebb97a2065ead4c

    SHA512

    93cf09dd8efbcbb353d68f0b049fca2df8f52c13a23847de24049680dcc5bd46185870db098d2c5a283a1b4f4d2a7165a3f4304c2f77447b8bb34eff8a24c723

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents
    Filesize

    3KB

    MD5

    b3b622f33b62976b2d43593d57622079

    SHA1

    b2dfa920721ea5d0ffd773bc283b2880349a0db9

    SHA256

    accef3c7115a55eb7232e406fedd4a01073f211f6c2dac58e859480c1c1adbd3

    SHA512

    3ab83ab88155455aee4d432533fe78a3d3facc6e322b4f08ff0c7476d79dbf2cfae959fa78d59fa53c98a541f9230e2327261d15e0625d4fbfba1921850eb23d

  • memory/1676-0-0x00000000743DE000-0x00000000743DF000-memory.dmp
    Filesize

    4KB

  • memory/1676-1-0x00000000002F0000-0x000000000039C000-memory.dmp
    Filesize

    688KB

  • memory/1676-2-0x0000000000210000-0x0000000000226000-memory.dmp
    Filesize

    88KB

  • memory/1676-3-0x00000000002C0000-0x00000000002C8000-memory.dmp
    Filesize

    32KB

  • memory/1676-4-0x00000000743D0000-0x0000000074ABE000-memory.dmp
    Filesize

    6.9MB

  • memory/1676-5-0x00000000743DE000-0x00000000743DF000-memory.dmp
    Filesize

    4KB

  • memory/1676-6-0x00000000743D0000-0x0000000074ABE000-memory.dmp
    Filesize

    6.9MB

  • memory/1676-7-0x0000000000490000-0x0000000000498000-memory.dmp
    Filesize

    32KB

  • memory/1676-9-0x00000000743D0000-0x0000000074ABE000-memory.dmp
    Filesize

    6.9MB