Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 22:37

General

  • Target

    36e8030d0946c331b4a667385163cb72_JaffaCakes118.exe

  • Size

    537KB

  • MD5

    36e8030d0946c331b4a667385163cb72

  • SHA1

    4ea151afd9a99d82b7f9bbdeda9de9268e16cf5d

  • SHA256

    8f635cc8326d76a55e41207ea05fc883cfaf7814c5f4a9004780011309504431

  • SHA512

    5373fb48f7344f5e754e5ba5aa9098011b98863fbfdc4a8a4a37515692f606d6b5038c732a97d9d1317965fe3e6b2f26fba0f4f17f922f5e79577607016b62b1

  • SSDEEP

    12288:ad6E5JTIFqdt2yHczPA1ZQ6UVIrSAa5iQF4Na:ad55JTvtHcuQ6UVIDa5i8O

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    alibaba123

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • Nirsoft 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36e8030d0946c331b4a667385163cb72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36e8030d0946c331b4a667385163cb72_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Roaming\Windows Update.exe
      "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:1952
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holderwb.txt"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2792

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
    Filesize

    84B

    MD5

    16aae4f865a722f7ead179aa07490922

    SHA1

    6fed5b176894bace1a09b0e42f5c64a02bd6f1e8

    SHA256

    3c6eb241c7965e08508e0530efc6254fb525a1c34d070502ec2623a53adcd2bc

    SHA512

    d03d0a29df3334996f8161f402ffccfb8e1efd48a0389d1d9df6c43eaf537348a556bbd68de8acb1d308d6908026df562ffc330f1ce7c5348a5be5b4356656cd

  • C:\Users\Admin\AppData\Local\Temp\Tar2CB1.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    537KB

    MD5

    36e8030d0946c331b4a667385163cb72

    SHA1

    4ea151afd9a99d82b7f9bbdeda9de9268e16cf5d

    SHA256

    8f635cc8326d76a55e41207ea05fc883cfaf7814c5f4a9004780011309504431

    SHA512

    5373fb48f7344f5e754e5ba5aa9098011b98863fbfdc4a8a4a37515692f606d6b5038c732a97d9d1317965fe3e6b2f26fba0f4f17f922f5e79577607016b62b1

  • memory/1952-48-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-53-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-72-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-47-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-46-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-51-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/1952-55-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-50-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-57-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1952-49-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/2316-2-0x0000000074AD0000-0x000000007507B000-memory.dmp
    Filesize

    5.7MB

  • memory/2316-0-0x0000000074AD1000-0x0000000074AD2000-memory.dmp
    Filesize

    4KB

  • memory/2316-11-0x0000000074AD0000-0x000000007507B000-memory.dmp
    Filesize

    5.7MB

  • memory/2316-1-0x0000000074AD0000-0x000000007507B000-memory.dmp
    Filesize

    5.7MB

  • memory/2792-77-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-73-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-79-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-75-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-81-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-87-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-85-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-84-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/2792-91-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/3032-21-0x0000000074A50000-0x0000000074FFB000-memory.dmp
    Filesize

    5.7MB

  • memory/3032-15-0x0000000074A50000-0x0000000074FFB000-memory.dmp
    Filesize

    5.7MB

  • memory/3032-92-0x0000000074A50000-0x0000000074FFB000-memory.dmp
    Filesize

    5.7MB

  • memory/3032-93-0x0000000074A50000-0x0000000074FFB000-memory.dmp
    Filesize

    5.7MB