Analysis
-
max time kernel
101s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe
-
Size
709KB
-
MD5
a016c13d92b2950a5494db8916dd77ba
-
SHA1
8113747da58ffaf3964850704eed9ae32eeed846
-
SHA256
0614874d49a085d84f0a2a71f370dff23a9898ee64a190d6cade492e4b91643d
-
SHA512
2fe6ec7044276bc6d1631db75edd14dd6f7f756a1240580b686b7f93328726b7f4553a47db0b7c36624f919f9a81e17eb99e73225f9ff085de252133325bec76
-
SSDEEP
12288:hnSLWoo7Zhx72JkQZvvkFMuYrIFmmh6JiBaA6Pt83cCS:RSLWZj7PQ5LamgaHV8zS
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exedescription pid Process procid_target PID 2248 set thread context of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 set thread context of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1628 2872 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exepid Process 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exevbc.exedescription pid Process Token: SeDebugPrivilege 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe Token: SeDebugPrivilege 2540 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exepid Process 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exevbc.exedescription pid Process procid_target PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2540 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2872 2248 a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe 31 PID 2872 wrote to memory of 1628 2872 vbc.exe 33 PID 2872 wrote to memory of 1628 2872 vbc.exe 33 PID 2872 wrote to memory of 1628 2872 vbc.exe 33 PID 2872 wrote to memory of 1628 2872 vbc.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a016c13d92b2950a5494db8916dd77ba_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"2⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1563⤵
- Program crash
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a18df529a77ed1fbd887400151b9728f
SHA174912cb5e97566749ccae5f70e52ee87cb4dfa07
SHA256599ceb2fab753551e7b27340cd3a9d2eb44a887dfb178d1c05015159bb352eb3
SHA512a446e30992bc63b53952982e06069555e9b65eb25274495470d4410a04bcc9aeaa96b95300fc89512181e0614abf279f439b52f32ffc6ffb3034230c97aa08b0