Analysis

  • max time kernel
    133s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 07:52

General

  • Target

    23e473332d88b997592273f52100dd71_JaffaCakes118.exe

  • Size

    1014KB

  • MD5

    23e473332d88b997592273f52100dd71

  • SHA1

    632af0c3d2d79ce41172195bfe99c1e2aedbc1db

  • SHA256

    4bb5700ff072f1d563a456b878481ba523cc45cd9517539dc2b640174727c9ec

  • SHA512

    c6538d6a169d37b685e2ccb9f1deee365946735947b16576fb915b5988b1956da32298e641c8cf2c367813786c5e29730c83397ab0bcee9e7ba82a230e45eb5c

  • SSDEEP

    12288:NDIWlcxVmnXbvMH4/pdcyd163+bX4v9Y/gM1oZPkYU7pMAlcZfj7g1P:NDIIXQuz1bIVYHYRQcZG

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23e473332d88b997592273f52100dd71_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23e473332d88b997592273f52100dd71_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\23e473332d88b997592273f52100dd71_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\23e473332d88b997592273f52100dd71_JaffaCakes118.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\23e473332d88b997592273f52100dd71_JaffaCakes118.exe.log

    Filesize

    1KB

    MD5

    400f1cc1a0a0ce1cdabda365ab3368ce

    SHA1

    1ecf683f14271d84f3b6063493dce00ff5f42075

    SHA256

    c8fa64f4b69df13ed6408fd4a204f318a36c2f38c85d4a4d42adfc9173f73765

    SHA512

    14c8cfd58d097e5e89c8cabe1e665173f1ccf604a9ef70cdcb84116e265f90819c19c891be408e0ad7e29086a5c2ea2883b7a7d1184878dbbac63e2cabcd1c45

  • memory/4284-11-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/4284-5-0x0000000005580000-0x0000000005590000-memory.dmp

    Filesize

    64KB

  • memory/4284-9-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

    Filesize

    4KB

  • memory/4284-4-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/4284-1-0x0000000000A30000-0x0000000000B34000-memory.dmp

    Filesize

    1.0MB

  • memory/4284-6-0x0000000005720000-0x000000000572A000-memory.dmp

    Filesize

    40KB

  • memory/4284-7-0x0000000008350000-0x00000000083EC000-memory.dmp

    Filesize

    624KB

  • memory/4284-12-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/4284-3-0x00000000054E0000-0x0000000005572000-memory.dmp

    Filesize

    584KB

  • memory/4284-2-0x0000000005B70000-0x0000000006114000-memory.dmp

    Filesize

    5.6MB

  • memory/4284-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

    Filesize

    4KB

  • memory/5028-8-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/5028-14-0x0000000005890000-0x0000000005906000-memory.dmp

    Filesize

    472KB

  • memory/5028-15-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/5028-16-0x00000000059B0000-0x0000000005A16000-memory.dmp

    Filesize

    408KB

  • memory/5028-13-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/5028-19-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB