Analysis

  • max time kernel
    135s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 13:15

General

  • Target

    3a4b5669a9bf7c169b932ddbff33b59d_JaffaCakes118.exe

  • Size

    781KB

  • MD5

    3a4b5669a9bf7c169b932ddbff33b59d

  • SHA1

    2fa1301131d575ab034495a743df5e58b4aea00c

  • SHA256

    750a251b2cb599537856bfd91bb2249407dca68f0f77b4d8d5f6fa6950630000

  • SHA512

    506d252430c5c4424caae0215e01c662c9c12f682333f407477beb21cbcf2d009811e4edab011d8a3aeb1331ee317858a0d3d51baa055fec49a4e619ea95ade1

  • SSDEEP

    12288:D9bqQOGV1JbIL9YZ0k8vOkkP3qgV/l6TbKA4BRAiPrcG3bSw8:Jqtos9Yuk8vyPMqLCiPwA+w8

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 6 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a4b5669a9bf7c169b932ddbff33b59d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a4b5669a9bf7c169b932ddbff33b59d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\za55srua\za55srua.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B00.tmp" "c:\Users\Admin\AppData\Local\Temp\za55srua\CSCABA342C3ACE4FF0AB548B7E7C6D69B.TMP"
        3⤵
          PID:2616
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp4615.tmp"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2904
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp37C4.tmp"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES1B00.tmp

      Filesize

      1KB

      MD5

      8c808f1b73d505b38f103386db0acad6

      SHA1

      1dee7d8f3ae0a322161487e901369290992ed319

      SHA256

      623c16df1cfff9fdb3c111b9222fe10e15a0f24fa3ddd2f49ed77acbc0906ffa

      SHA512

      758f5a00e7087dc8258aecbcae9f8aff8a56e141e0d8f21ff717ea91cf49a195436555e7db17e34f8a6677d9613856c4437fa0239ebe435b2d0982dcefb74768

    • C:\Users\Admin\AppData\Local\Temp\tmp4615.tmp

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Local\Temp\za55srua\za55srua.dll

      Filesize

      9KB

      MD5

      90e0aa7f889984eba4a1a58c53449db7

      SHA1

      c83e1ae825b88d782c46cf257cc77f61df1691d4

      SHA256

      97ec8b3b86994c8b0e13bff90eaff717ce3dc419a26bcad74d5de4f91f0ab309

      SHA512

      1774b85987273b58906740dc7cb582d11cb5cf06f75d4add10a144aeae3606940579c2e2f25c8b99faf5eaf0e63f9b6dfff0a23db3b5b70bf2e79555bac1a38c

    • C:\Users\Admin\AppData\Local\Temp\za55srua\za55srua.pdb

      Filesize

      25KB

      MD5

      b2f4d7181cee611ac8f2c2731ad2a799

      SHA1

      05d9b1aa6e2e18f66e36bd6dc6292d367ec8b831

      SHA256

      5d08a401df3b34df63bdb65d52ed26a5f6b39853dd4d4115f7e8a0b24e4da7b7

      SHA512

      2a9b76109a9ac72486314348cadf3ca56ce191fbc19cd6e0ad391376ce5155fddcb2abd72a4102f354295a2b6bbfcd565be3a871bd1dc6fd5548d2c73785dc8d

    • \??\c:\Users\Admin\AppData\Local\Temp\za55srua\CSCABA342C3ACE4FF0AB548B7E7C6D69B.TMP

      Filesize

      1KB

      MD5

      2c7008cf3f6443f233ced6be962afe33

      SHA1

      37e91c15315700618a160ec94d638700b8880058

      SHA256

      ac6cb14697bf4c09f1b26ab286ba96416369d8b5490a048c789b580a96b8ff4f

      SHA512

      893dd17c44dfb1eccb134c37228b52b778304c8d5f647c99fccf09fede8cfec4ae4749f392b6a4c879ace0ca56de39ea650470a9ea3aeb0b25d4a56aefacfa30

    • \??\c:\Users\Admin\AppData\Local\Temp\za55srua\za55srua.0.cs

      Filesize

      10KB

      MD5

      7b31d5e87e173b0f14e5b7ee68289ca5

      SHA1

      3e4a8d348fa7db44b246441dc2fe577c637fc9e0

      SHA256

      0fb64694a4171bdb2afaf7a25ebdc3b24a394a580d9c4d86057262bb3997a4ac

      SHA512

      0b352cc4eee1c9e386ac0cc688b42c95d5955a82a5cd2801516b9bc68f88aaebd5a1b0733cc38fd7a363e8104ce6c757c5c4354f81e4e9226462a058c7881895

    • \??\c:\Users\Admin\AppData\Local\Temp\za55srua\za55srua.cmdline

      Filesize

      312B

      MD5

      8b7d0864157c66df19c31cff4c4c3f8d

      SHA1

      b26dffaba2a3ef5345f5ee5c9db67a3703f89c43

      SHA256

      dfd5bf9ad3d694d44a22ca3c956eac12ae5d75f4ac11e68fa979aacf58055d35

      SHA512

      24e6be2c695bed0b6250bea890d692b58317c5d4845ccb38144ee2bb3a9bc28219e3d4c3f7cd80c9c20920bb464268ce2c370048b20cd1849d3308088488c056

    • memory/1560-18-0x00000000004C0000-0x00000000004C8000-memory.dmp

      Filesize

      32KB

    • memory/1560-38-0x0000000074E60000-0x000000007554E000-memory.dmp

      Filesize

      6.9MB

    • memory/1560-3-0x0000000074E60000-0x000000007554E000-memory.dmp

      Filesize

      6.9MB

    • memory/1560-2-0x0000000000370000-0x0000000000378000-memory.dmp

      Filesize

      32KB

    • memory/1560-20-0x0000000005090000-0x000000000512A000-memory.dmp

      Filesize

      616KB

    • memory/1560-21-0x0000000000540000-0x000000000054C000-memory.dmp

      Filesize

      48KB

    • memory/1560-22-0x0000000005270000-0x0000000005300000-memory.dmp

      Filesize

      576KB

    • memory/1560-1-0x0000000001330000-0x00000000013C6000-memory.dmp

      Filesize

      600KB

    • memory/1560-0-0x0000000074E6E000-0x0000000074E6F000-memory.dmp

      Filesize

      4KB

    • memory/2592-33-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2592-29-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2592-37-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2592-35-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2592-23-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2592-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2592-25-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2592-39-0x00000000009B0000-0x0000000000A26000-memory.dmp

      Filesize

      472KB

    • memory/2592-27-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/2716-69-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-60-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-71-0x0000000000420000-0x00000000005A1000-memory.dmp

      Filesize

      1.5MB

    • memory/2716-72-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-70-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-58-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-62-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-64-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2716-66-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2904-52-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-41-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-56-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-53-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-51-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2904-43-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-45-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-47-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2904-49-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB