Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 00:42

General

  • Target

    7b1f0563576b3c5af9f4b6faf07529bb_JaffaCakes118.exe

  • Size

    328KB

  • MD5

    7b1f0563576b3c5af9f4b6faf07529bb

  • SHA1

    a604fffc91898085c5978c5c09ab375140902c20

  • SHA256

    1ea8ef6762ff35035136847b8d52f181a10831ba519bb4f8662396f55d3aaa2f

  • SHA512

    139e6ec33f9651586511807993d91d8aebfa59750df1be6a6a663ad8d36a32623246dae0627ebd397e76c80a46794d637b8953924ecc1cafcaa09fdbbd962ed5

  • SSDEEP

    6144:nd6a9GdC+9G33XV4nPZ9dQZrV3qh3vhF/J8wR9b4V/f/xWs0/WEFb865QrTQg5v:d6a9+C+I3novdaVOxhb4VMsOdg5v

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gandi.net
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @@yahoo.com@@

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b1f0563576b3c5af9f4b6faf07529bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7b1f0563576b3c5af9f4b6faf07529bb_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe" -n
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.lnk" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3704
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.lnk" /f
          4⤵
          • Adds Run key to start application
          PID:616
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          PID:4328
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          4⤵
            PID:1324
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

      Filesize

      3KB

      MD5

      f94dc819ca773f1e3cb27abbc9e7fa27

      SHA1

      9a7700efadc5ea09ab288544ef1e3cd876255086

      SHA256

      a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

      SHA512

      72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\fl.txt

      Filesize

      11B

      MD5

      d1c56374fff0243832b8696d133b7861

      SHA1

      f4d236fdec2fd03914189c3b26e5cb0dfea9d761

      SHA256

      8e8eab0b4bfdc35c5f238935b81298e43970ee6818e9629d725297ebf03838a6

      SHA512

      e74cbfc425b9779b79dfb6b53dbf3d1451f9f35a766cc5167932b95c9bdb5288b65f9886fbdf3c3b180bf3a8360bfa1ef577b63e3443cae04b49e7ece433c452

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe

      Filesize

      328KB

      MD5

      7b1f0563576b3c5af9f4b6faf07529bb

      SHA1

      a604fffc91898085c5978c5c09ab375140902c20

      SHA256

      1ea8ef6762ff35035136847b8d52f181a10831ba519bb4f8662396f55d3aaa2f

      SHA512

      139e6ec33f9651586511807993d91d8aebfa59750df1be6a6a663ad8d36a32623246dae0627ebd397e76c80a46794d637b8953924ecc1cafcaa09fdbbd962ed5

    • memory/1324-41-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1324-42-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/1324-49-0x0000000000400000-0x0000000000458000-memory.dmp

      Filesize

      352KB

    • memory/2652-3-0x0000000005460000-0x00000000054FC000-memory.dmp

      Filesize

      624KB

    • memory/2652-6-0x0000000005E30000-0x00000000063D4000-memory.dmp

      Filesize

      5.6MB

    • memory/2652-23-0x0000000074E40000-0x00000000755F0000-memory.dmp

      Filesize

      7.7MB

    • memory/2652-5-0x0000000005820000-0x0000000005878000-memory.dmp

      Filesize

      352KB

    • memory/2652-4-0x0000000074E40000-0x00000000755F0000-memory.dmp

      Filesize

      7.7MB

    • memory/2652-2-0x0000000005360000-0x00000000053F2000-memory.dmp

      Filesize

      584KB

    • memory/2652-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

      Filesize

      4KB

    • memory/2652-1-0x00000000008F0000-0x0000000000948000-memory.dmp

      Filesize

      352KB

    • memory/3276-30-0x0000000005880000-0x00000000058D6000-memory.dmp

      Filesize

      344KB

    • memory/3276-34-0x0000000007B60000-0x0000000007BC6000-memory.dmp

      Filesize

      408KB

    • memory/3276-36-0x00000000085C0000-0x00000000085C8000-memory.dmp

      Filesize

      32KB

    • memory/3276-29-0x0000000005770000-0x000000000577A000-memory.dmp

      Filesize

      40KB

    • memory/3276-27-0x0000000000400000-0x0000000000488000-memory.dmp

      Filesize

      544KB

    • memory/4180-24-0x0000000074E40000-0x00000000755F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4180-50-0x0000000074E40000-0x00000000755F0000-memory.dmp

      Filesize

      7.7MB

    • memory/4328-38-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4328-37-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4328-39-0x0000000000420000-0x00000000004E9000-memory.dmp

      Filesize

      804KB

    • memory/4328-40-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4980-33-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB