Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 03:47

General

  • Target

    85e41a65ff21c6d4d41df8e23bffa808_JaffaCakes118.exe

  • Size

    780KB

  • MD5

    85e41a65ff21c6d4d41df8e23bffa808

  • SHA1

    b22a88e0a71d7d6d248f403fb8ba989af1911fa2

  • SHA256

    376b073f2248a13be1b834e616d9625cddf689b36258bf42143efded46ea67f6

  • SHA512

    95c4b121b8146f7d970c848cc46880295c8b19fb5eb60158439cf52aeac0b9cb744052ffaac8df3d26272093ea2e3e39d357069f7ddb31e514fe25cf322e4652

  • SSDEEP

    12288:ICG20qQOGFoJDQ+GqAFuFUld+gpH1OHMhrhBKu3fN:ICuqtioJDQ9qQuGX+gpH1OcBn

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.porr.com.mk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Sas@@1234

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 2 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85e41a65ff21c6d4d41df8e23bffa808_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\85e41a65ff21c6d4d41df8e23bffa808_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3gkhffxt\3gkhffxt.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A59.tmp" "c:\Users\Admin\AppData\Local\Temp\3gkhffxt\CSCB1C787B2568496D8DD8361BF56E766.TMP"
        3⤵
          PID:1136
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5636
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp6486.tmp"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1940
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp689E.tmp"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:5364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3gkhffxt\3gkhffxt.dll

      Filesize

      8KB

      MD5

      a9d57ff690ff36f6ac0fb65705fa57d8

      SHA1

      8542c5fa7dccda5a0db5e99c1bc5ddd52182f06a

      SHA256

      ed681cef5168289ca3703389f95789841a9dafac90f6fdf0ec2f0b9919acbdec

      SHA512

      5957c4001ad453afa7fd6e76533cdeef932f7725a6ead3250874321f1d41790a9d86efb37e34b95966c2adb391ff0893d6331aed09d857ec5cb914ad6ca616c7

    • C:\Users\Admin\AppData\Local\Temp\3gkhffxt\3gkhffxt.pdb

      Filesize

      21KB

      MD5

      31f8da682f2514a0b39098d2e67fc4ff

      SHA1

      41c948b7f4b7576aad47b8aded970cb66efcea17

      SHA256

      c6a2e5d1d2e8645a1b2bb062eaa31316fadf4eb55e0d40b66ab8b07a468bebca

      SHA512

      dcb0f117a064f2d8298f31aba39bb7723ba6c08d6c205fd0190e5d95d48a570904bfd6fe61fdc0fd79aad5261060edeb853128d78fd38cc52a8a778a5f7b191d

    • C:\Users\Admin\AppData\Local\Temp\RES3A59.tmp

      Filesize

      1KB

      MD5

      21afabb9cee71690b95343d4c13c2f50

      SHA1

      61df6588304116092f00f898dd44fc5f1aaf9e83

      SHA256

      4e61c9d51c5415af69df84c5ca0ace84667c4305db0d56a532034c66e2f635e6

      SHA512

      209612ae495a962ee999cb5c95938ae357c5c3e67b172e3d50007da7ab44c54441c9288623a261fed31eee1874d7f735039dca26ef74ed887146c283b772cad6

    • C:\Users\Admin\AppData\Local\Temp\tmp6486.tmp

      Filesize

      4KB

      MD5

      a13985d129d8bf808cec12f9fe7b4ed3

      SHA1

      3981490aa1ce9401c4470f0277fda627d9236356

      SHA256

      d3a2b4e44262cfbfb97652de5f54b36bfc525396d1d70dea03ab24c902dab8ef

      SHA512

      5c990ca4e978b874e0863ad4bf1ccbe04499960d5c17fb16776297d22db5f168aa3a5a9863ec5a9f8286dda2f9fd96852f2dc2ef029c13ba659e33694c344887

    • \??\c:\Users\Admin\AppData\Local\Temp\3gkhffxt\3gkhffxt.0.cs

      Filesize

      10KB

      MD5

      fde945a51e5fdf1543bea4a9931b85da

      SHA1

      67921637ed634306472665592bbbf54a38c75a41

      SHA256

      aa679b2aa59d772a437935e146a2caf13e84a3efbdb7eae4ddfb3403460c6051

      SHA512

      39b307d8737da828765b23eb9066dd81c1767ee64844815a2570bae2065cdb24b90bc644c913810b7746d0f13720013526fe685370b5ff425e8f6c76b3baa785

    • \??\c:\Users\Admin\AppData\Local\Temp\3gkhffxt\3gkhffxt.cmdline

      Filesize

      312B

      MD5

      83e28f9c1b06083fea57cf6e59d25d29

      SHA1

      010b39f6ed34404db0ef49d49f08c6df34899b49

      SHA256

      ba26c49a550d6e8e144d2dec8cd5d23045e5a01a29043499fa3f48c615d9fd8a

      SHA512

      62bf85e7af079edb626f7939c0fbc562f1b2f9b1de6f603b909af964b4e86b005c2a87455ed56bd21034d96c12054579495fb816aa6cbc2160e585ea9082f189

    • \??\c:\Users\Admin\AppData\Local\Temp\3gkhffxt\CSCB1C787B2568496D8DD8361BF56E766.TMP

      Filesize

      1KB

      MD5

      f8de7fc47aa2e8126911b66dc7173efd

      SHA1

      da5fcdc02a72e7a868403ad6ef04bc2fa98d1abe

      SHA256

      77e246bd8983f3548344bf656b39e3026c116dc61bd99d9c0648bfe1994c6131

      SHA512

      54cacc28027318af9e86351220d65788d5e88da4eca2386d8d4ab3ada6e6328b7745d31f5e9bf1fc53c4db03bb474d89d3d6d34d98103aa696c4d8f6182d56a7

    • memory/1940-40-0x0000000000460000-0x0000000000529000-memory.dmp

      Filesize

      804KB

    • memory/1940-34-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1940-42-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1940-32-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1940-36-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4672-1-0x0000000000F70000-0x0000000001006000-memory.dmp

      Filesize

      600KB

    • memory/4672-2-0x0000000005980000-0x0000000005A12000-memory.dmp

      Filesize

      584KB

    • memory/4672-23-0x0000000006070000-0x0000000006100000-memory.dmp

      Filesize

      576KB

    • memory/4672-24-0x00000000061A0000-0x000000000623C000-memory.dmp

      Filesize

      624KB

    • memory/4672-22-0x0000000005B90000-0x0000000005B9C000-memory.dmp

      Filesize

      48KB

    • memory/4672-27-0x00000000750D0000-0x0000000075880000-memory.dmp

      Filesize

      7.7MB

    • memory/4672-4-0x00000000750D0000-0x0000000075880000-memory.dmp

      Filesize

      7.7MB

    • memory/4672-3-0x0000000005920000-0x0000000005928000-memory.dmp

      Filesize

      32KB

    • memory/4672-0-0x00000000750DE000-0x00000000750DF000-memory.dmp

      Filesize

      4KB

    • memory/4672-21-0x0000000005FD0000-0x000000000606A000-memory.dmp

      Filesize

      616KB

    • memory/4672-19-0x0000000005930000-0x0000000005938000-memory.dmp

      Filesize

      32KB

    • memory/5364-45-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/5364-44-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/5364-46-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/5636-30-0x0000000071560000-0x0000000071B11000-memory.dmp

      Filesize

      5.7MB

    • memory/5636-29-0x0000000071560000-0x0000000071B11000-memory.dmp

      Filesize

      5.7MB

    • memory/5636-28-0x0000000071562000-0x0000000071563000-memory.dmp

      Filesize

      4KB

    • memory/5636-25-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/5636-47-0x0000000071560000-0x0000000071B11000-memory.dmp

      Filesize

      5.7MB

    • memory/5636-48-0x0000000071562000-0x0000000071563000-memory.dmp

      Filesize

      4KB

    • memory/5636-49-0x0000000071560000-0x0000000071B11000-memory.dmp

      Filesize

      5.7MB