Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
37b35e5116aecaf748886250846f6cf5
-
SHA1
83fc73693ef8c33d70b82aed137122388d9abce9
-
SHA256
0c1fadc894e5c410da5afad5d44e333c1a77912892ed4d2141e3ce16018a064f
-
SHA512
6e310bda0db29905f7352c109e4d6f4e134cb9a6508e95da04125c01bdba8d0c29fb1a8c75177c9413310f656ae4709d675cb239537fd98a900db1c424708c5d
-
SSDEEP
49152:Eu0c++OCvkGs9Fal9G2Yx1Y53xoHTsRwC2OT9sY:DB3vkJ9AG2RBozsRwqBs
Malware Config
Signatures
-
404 Keylogger
Information stealer and keylogger first seen in 2019.
-
404 Keylogger Main Executable 3 IoCs
resource yara_rule behavioral1/memory/2208-2-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger behavioral1/memory/2208-6-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger behavioral1/memory/2208-4-0x0000000000400000-0x0000000000422000-memory.dmp family_404keylogger -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe RegSvcs.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2184 2208 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2208 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2208 2028 37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2184 2208 RegSvcs.exe 32 PID 2208 wrote to memory of 2184 2208 RegSvcs.exe 32 PID 2208 wrote to memory of 2184 2208 RegSvcs.exe 32 PID 2208 wrote to memory of 2184 2208 RegSvcs.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37b35e5116aecaf748886250846f6cf5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 10683⤵
- Program crash
PID:2184
-
-