Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 16:14

General

  • Target

    2aca79fda2f8a1921295b09bd486de16_JaffaCakes118.exe

  • Size

    808KB

  • MD5

    2aca79fda2f8a1921295b09bd486de16

  • SHA1

    0e6bf9c82791862d69836bd14aceca46841bf53a

  • SHA256

    19c68f9e178765d9676476754db29a351eb8eebf905bb97b95e0c954520052a5

  • SHA512

    7408354fec602fac9e16b16220d657ced49c39be7a365dd10d6c77c0d955bfce9249520288ded3f454d30e7c38d00b9f615e0b2ffc4cc37ec08498ba793f515e

  • SSDEEP

    12288:D/YzK338/LgnU7wz9yl084/hAQR/8Hcmy6ZzPa8csxEU6LRHb6+js+:kz//Lg5cf4/hVR/88GZO8vOU2Hb6+s+

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • Detect Neshta payload 4 IoCs
  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • M00nD3v Logger payload 2 IoCs

    Detects M00nD3v Logger payload in memory.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aca79fda2f8a1921295b09bd486de16_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2aca79fda2f8a1921295b09bd486de16_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\3582-490\2aca79fda2f8a1921295b09bd486de16_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\2aca79fda2f8a1921295b09bd486de16_JaffaCakes118.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wcdbkmwo\wcdbkmwo.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AD6.tmp" "c:\Users\Admin\AppData\Local\Temp\wcdbkmwo\CSC297CC955619C485CBA6919D8C79594.TMP"
          4⤵
            PID:2952
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
          3⤵
            PID:4852

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

        Filesize

        86KB

        MD5

        3b73078a714bf61d1c19ebc3afc0e454

        SHA1

        9abeabd74613a2f533e2244c9ee6f967188e4e7e

        SHA256

        ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

        SHA512

        75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

      • C:\Users\Admin\AppData\Local\Temp\3582-490\2aca79fda2f8a1921295b09bd486de16_JaffaCakes118.exe

        Filesize

        768KB

        MD5

        c837f1b546fa78b71ea2a65e639d198a

        SHA1

        7d75295a0cdb8511b21b3e5b0bd5c9bf9492f51f

        SHA256

        adce65abb9d9828f364dd7ec4f2e349be85291064edc3596545d67f9933d2e64

        SHA512

        48037d6c3df2fd8875bfda5dce78b40f5bacde36a12539f75758c6388acfe476e5bf339fe7254a1c3a0b509576fcafa4b9e4ac603031e3e124f169e75e208654

      • C:\Users\Admin\AppData\Local\Temp\RES3AD6.tmp

        Filesize

        1KB

        MD5

        21961e5f3084ea9ac1b6b7a60757a058

        SHA1

        e80b827f523d45f912b05561167f40cf2c97911b

        SHA256

        4403237e2f2359b76e0595361dc86b3d25a412c35d41c95284755cb352a0453c

        SHA512

        ea723bb1a6db2cebf8700a27835a056400d2064a546324a7b785e612407fba888c8d50f7da57c55c1547a66220d85ccd96df42b273a7ee22904a2a803d07f71b

      • C:\Users\Admin\AppData\Local\Temp\wcdbkmwo\wcdbkmwo.dll

        Filesize

        6KB

        MD5

        8eee4a2043dc238fd6a191fdf9ab78c8

        SHA1

        839ce715ab4e4849e00f6b1cb826c852bb2fb766

        SHA256

        01522b5ec490fa7b76f4ca00d327c2670e516b6cb7ba743e19f3223cc9faaadf

        SHA512

        06dcf5d5b50c3e9162cd5fc8993762990fe562b8be3c55c2cfbd191f243e78f948fa7130e69cc5536bf601ad61254c9f39cd717fd19a5553186283038a5bae1e

      • C:\Users\Admin\AppData\Local\Temp\wcdbkmwo\wcdbkmwo.pdb

        Filesize

        19KB

        MD5

        239a0b591968ac9ff85e982c2f5c5892

        SHA1

        d8e970eb0df3243bbb8c6b8aaedfdcb569a27c1d

        SHA256

        1210d19ff5b60701ed94c73f679a98df618c8044a891044f21701d70fa851361

        SHA512

        e9246f8b6af8141fc5a0e426444fd0a6b474f3ea082fe150bab27ac93eca9ad7cc1d9071031bae6af3c24b9b96c2557c2a90cb4dc529be490d466182ef2dd331

      • C:\Users\Admin\AppData\Roaming\TEMPLA~1\app.exe

        Filesize

        808KB

        MD5

        ee4b43c8ae63154f7bee8cc99b0b778d

        SHA1

        65dfa03c661d73c4a102f54383eadbbb1ab55fd0

        SHA256

        e14caee066cd8754ee3299f213ef78d69cf3be9ed4b50e66c1ac05cd0908084a

        SHA512

        b6c6600307d5ead0a3797674d424def897c9d5f7ba29bb614daaf38b56fbcb920618f6a6a2603f1def1dac4e99ccde0cfe6bfe0facd81a4f2dc46e4d52aaabce

      • \??\c:\Users\Admin\AppData\Local\Temp\wcdbkmwo\CSC297CC955619C485CBA6919D8C79594.TMP

        Filesize

        1KB

        MD5

        f5c01b6bfcbc154867042f82762fb07a

        SHA1

        5d4b07c39b8dcba0f8413e618f12f369139ce027

        SHA256

        95741b8eaa06321cc9685c13e68fb2e6a010663d33993d9ea6f7e8a953f4154c

        SHA512

        ee489afa983612791a3c8a464a8043a30ae0414c1e4df0c3066b4d139a5ac8ca8b17a1578acb30c10fdb6d22772aa3257335ee86e7f732ac4c8456dc454874a6

      • \??\c:\Users\Admin\AppData\Local\Temp\wcdbkmwo\wcdbkmwo.0.cs

        Filesize

        4KB

        MD5

        a2cd0c2dee5b5dc32f99795171b1fe81

        SHA1

        857a90f04cbe1fc42e993247bfced69d7ee9865f

        SHA256

        89f6035db1458a244a10812277a63ceb1049df7a84a7aa9645e7eb92c53b0eff

        SHA512

        2680c8cbaa71cef9b739df95ec2242009d512017b17a10f244174bae82583f0263a25821a232b8cb5ae621219172d768ea6dbbd0025b968d61288c9cee78e61c

      • \??\c:\Users\Admin\AppData\Local\Temp\wcdbkmwo\wcdbkmwo.cmdline

        Filesize

        312B

        MD5

        0bb29854c2d9d52264aa053d9cfc5635

        SHA1

        6173b2971a5babcfe39373e73cb62a45d3464d81

        SHA256

        d44cdd409f9c0f3bff53a1298f2b9087550736bb2c2102655290db79fb49a627

        SHA512

        62edc18be098f62dd5d9f22b02d18a8a75547eba42c8df1b79e40299de38bd060073443f46e7aba4e044bd670a0e7ad4127f7c9aef4c0c25ab9756efa5cad722

      • memory/1416-131-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1416-136-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1416-134-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/4004-37-0x0000000005330000-0x00000000053C0000-memory.dmp

        Filesize

        576KB

      • memory/4004-33-0x0000000004F60000-0x0000000004FFA000-memory.dmp

        Filesize

        616KB

      • memory/4004-34-0x0000000004E00000-0x0000000004E0C000-memory.dmp

        Filesize

        48KB

      • memory/4004-19-0x00000000731C0000-0x0000000073970000-memory.dmp

        Filesize

        7.7MB

      • memory/4004-38-0x0000000005460000-0x00000000054FC000-memory.dmp

        Filesize

        624KB

      • memory/4004-41-0x00000000731C0000-0x0000000073970000-memory.dmp

        Filesize

        7.7MB

      • memory/4004-13-0x00000000003C0000-0x0000000000452000-memory.dmp

        Filesize

        584KB

      • memory/4004-12-0x00000000731CE000-0x00000000731CF000-memory.dmp

        Filesize

        4KB

      • memory/4004-14-0x0000000004CA0000-0x0000000004D32000-memory.dmp

        Filesize

        584KB

      • memory/4004-15-0x00000000025C0000-0x00000000025C8000-memory.dmp

        Filesize

        32KB

      • memory/4004-31-0x0000000004C90000-0x0000000004C98000-memory.dmp

        Filesize

        32KB

      • memory/4852-39-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB