Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 00:42

General

  • Target

    7b1f0563576b3c5af9f4b6faf07529bb_JaffaCakes118.exe

  • Size

    328KB

  • MD5

    7b1f0563576b3c5af9f4b6faf07529bb

  • SHA1

    a604fffc91898085c5978c5c09ab375140902c20

  • SHA256

    1ea8ef6762ff35035136847b8d52f181a10831ba519bb4f8662396f55d3aaa2f

  • SHA512

    139e6ec33f9651586511807993d91d8aebfa59750df1be6a6a663ad8d36a32623246dae0627ebd397e76c80a46794d637b8953924ecc1cafcaa09fdbbd962ed5

  • SSDEEP

    6144:nd6a9GdC+9G33XV4nPZ9dQZrV3qh3vhF/J8wR9b4V/f/xWs0/WEFb865QrTQg5v:d6a9+C+I3novdaVOxhb4VMsOdg5v

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gandi.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @@yahoo.com@@

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 8 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 8 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b1f0563576b3c5af9f4b6faf07529bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7b1f0563576b3c5af9f4b6faf07529bb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe" -n
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.lnk" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.lnk" /f
          4⤵
          • Adds Run key to start application
          PID:1868
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          PID:1580
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          4⤵
            PID:324
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1452

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scripting

    1
    T1064

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarB5A0.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\fl.txt
      Filesize

      11B

      MD5

      d1c56374fff0243832b8696d133b7861

      SHA1

      f4d236fdec2fd03914189c3b26e5cb0dfea9d761

      SHA256

      8e8eab0b4bfdc35c5f238935b81298e43970ee6818e9629d725297ebf03838a6

      SHA512

      e74cbfc425b9779b79dfb6b53dbf3d1451f9f35a766cc5167932b95c9bdb5288b65f9886fbdf3c3b180bf3a8360bfa1ef577b63e3443cae04b49e7ece433c452

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe
      Filesize

      328KB

      MD5

      7b1f0563576b3c5af9f4b6faf07529bb

      SHA1

      a604fffc91898085c5978c5c09ab375140902c20

      SHA256

      1ea8ef6762ff35035136847b8d52f181a10831ba519bb4f8662396f55d3aaa2f

      SHA512

      139e6ec33f9651586511807993d91d8aebfa59750df1be6a6a663ad8d36a32623246dae0627ebd397e76c80a46794d637b8953924ecc1cafcaa09fdbbd962ed5

    • memory/324-55-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/324-57-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/324-54-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/1452-42-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1452-47-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1452-46-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1452-45-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1452-44-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/1452-36-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1452-38-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1452-40-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1580-51-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1580-50-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1580-53-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2164-1-0x0000000000C70000-0x0000000000CC8000-memory.dmp
      Filesize

      352KB

    • memory/2164-2-0x0000000074DE0000-0x00000000754CE000-memory.dmp
      Filesize

      6.9MB

    • memory/2164-3-0x0000000004290000-0x00000000042E8000-memory.dmp
      Filesize

      352KB

    • memory/2164-16-0x0000000074DE0000-0x00000000754CE000-memory.dmp
      Filesize

      6.9MB

    • memory/2164-0-0x0000000074DEE000-0x0000000074DEF000-memory.dmp
      Filesize

      4KB

    • memory/2404-49-0x0000000000690000-0x0000000000698000-memory.dmp
      Filesize

      32KB

    • memory/2404-23-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2404-22-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2404-30-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2404-33-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2404-32-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2404-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2404-27-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2404-25-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/2616-17-0x0000000074DE0000-0x00000000754CE000-memory.dmp
      Filesize

      6.9MB

    • memory/2616-15-0x00000000000D0000-0x0000000000128000-memory.dmp
      Filesize

      352KB

    • memory/2616-59-0x0000000074DE0000-0x00000000754CE000-memory.dmp
      Filesize

      6.9MB