Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe
-
Size
674KB
-
MD5
5f5fedb71b12f1cfb4c2b175a7504024
-
SHA1
3e8bc5c6662af152b2ad7a9a85285f62bd8d1062
-
SHA256
cdc6b63d19637a4b99a7e1843b841473b6d42d6b2ce211a2e2b5430b3c11217f
-
SHA512
d31b0667dec211fb0e37fe70b16ff9c42f75385b5dbd981c6aa3bd2c52e064b5e77786078fd0d51fe2586306f5d28e572ec6c2c116df6117729ead9914eacedc
-
SSDEEP
6144:Zq8tLCzEk3lG7Nu+Zsh2T7i/SYMwqX6d1uzP4fTbBuYsycx6Fvtb45bQYk8qUXfY:xtklG8Th4+MRXa1IKfMYhI6Tbsx9fGt
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2556-16-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla behavioral1/memory/2556-13-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla behavioral1/memory/2556-12-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla behavioral1/memory/2556-21-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla behavioral1/memory/2556-19-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 2556 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyOMOTASY = "C:\\Users\\Admin\\AppData\\Roaming\\MyOMOTASY\\MyOMOTASY.exe" 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\MyOMOTASY\MyOMOTASY.exe\:Zone.Identifier:$DATA 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe File created C:\Users\Admin\AppData\Local\Temp\5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 2556 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe Token: SeDebugPrivilege 2556 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2556 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2612 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2612 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2612 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2612 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2556 2228 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f5fedb71b12f1cfb4c2b175a7504024_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
674KB
MD55f5fedb71b12f1cfb4c2b175a7504024
SHA13e8bc5c6662af152b2ad7a9a85285f62bd8d1062
SHA256cdc6b63d19637a4b99a7e1843b841473b6d42d6b2ce211a2e2b5430b3c11217f
SHA512d31b0667dec211fb0e37fe70b16ff9c42f75385b5dbd981c6aa3bd2c52e064b5e77786078fd0d51fe2586306f5d28e572ec6c2c116df6117729ead9914eacedc