Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe
-
Size
309KB
-
MD5
ab9b13bfe075715637b77b9ec4c70481
-
SHA1
2573e9f9ea0b537f3108a4f9b1c8e101058cc405
-
SHA256
4cbfae2977edd83d004db156859d15036289ea2dfbfeaef5aac8b5ea030a8d01
-
SHA512
03bc1caaa8920fa7903ce6e30ad381481690b66242aabcbae2a2cf265c89b2d85318033a4d0bfab6020911a2acad33bf34b71cbc8afea6f0d1a325cd148e8d45
-
SSDEEP
6144:wX649Vl1jeHZyL4b8yvuDbL7DXdN8wBYm7OCBy9Z/fLbDDff/TG:wXdPDGmDbPDXdNSKOCK3LnD3L
Malware Config
Extracted
lokibot
https://basitchemcials.com/wp-content/uploads/09/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe Token: SeDebugPrivilege 2684 vbc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2140 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2140 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2140 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2140 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 28 PID 2140 wrote to memory of 2768 2140 csc.exe 30 PID 2140 wrote to memory of 2768 2140 csc.exe 30 PID 2140 wrote to memory of 2768 2140 csc.exe 30 PID 2140 wrote to memory of 2768 2140 csc.exe 30 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2684 2564 ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab9b13bfe075715637b77b9ec4c70481_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jxpfm5j4\jxpfm5j4.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1584.tmp" "c:\Users\Admin\AppData\Local\Temp\jxpfm5j4\CSCAED25F6815274F12AF28D79E2BB79818.TMP"3⤵PID:2768
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5682cc8e594f71acba4bf59dd02dabb0a
SHA1f7282c3e6dce4ab19ad4b2bc90256016e337804c
SHA25654ab45b65ee8c16e81180c8e6a28b6b3d12283c1a01680263889cef0d921a5b6
SHA5121c11ee6fa95ad90477ae5d862a235d43b0c46f78d2af27cffc1d0915950c26f9f9b7570f081e7c9f2949b0bc5e5ae3a4f3c6ad79c1b052c9536803e097dcd3ea
-
Filesize
7KB
MD54429a2ad6a5e4cca58cdeb6271550118
SHA1ac387060297ac766120af610032f29d7d41f8b5a
SHA256bca5748d2e47ee16eee57284d362ef64a63cd20b306c487db2cf639082d8adfc
SHA512a0966f1e3792ef9d88525ff71e11c9df5ff7847a2b1059bc862af1ca19fa5100ed898229c6d118f7a14127c7c76a6e505559849953c55e16f691bb843a92c141
-
Filesize
19KB
MD53ffc61105e24655a80b3cdc56c85b150
SHA17c202e13c2cdec7d39ee8ac9a48364414005200f
SHA25648a95fa19599c36d457b444d37c3dca0379efa70c4b1fcb377ea2e2f722eb83b
SHA512081468b422c55bf535a47bf6d727cd5758697af61f81340870ead63b32ba7c9a0452e482191f6a857106a69eae46b6ff960f4d5650a097b887eccffa3c3ee356
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1340930862-1405011213-2821322012-1000\0f5007522459c86e95ffcc62f32308f1_527e8b4f-d968-48c7-a5cc-e9c96c60868c
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1340930862-1405011213-2821322012-1000\0f5007522459c86e95ffcc62f32308f1_527e8b4f-d968-48c7-a5cc-e9c96c60868c
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
Filesize
1KB
MD56268dc87d97cbd2b6d101e534a6d1f52
SHA1ed0007094df1e0fcd41c3527e5aafed213a8fe5f
SHA2563ff86d6c7267b4a8ad305744ba00f75b8f0ecd7a0cf40c33e049b140c674aad1
SHA51220b68fe6dcde654c9f5d81a97f4600c8ab5244a72193fed339402aa2f11144901238a161e5e76622a08ca3d30439879c6a31198c0b35fd2e0c8c6f0f2d5737b5
-
Filesize
4KB
MD536048832f59d3c1662b1292c78c44e89
SHA102eabcf2081b895ee0e090e8edafbc81136b4843
SHA2563b9785b1994ca849db0a7688f5a5ad8039f2013b66d7957f73d4e47188e83d48
SHA51287335388820b38e07998531a8fab3c044ad9cc6df89cc975ae46649f317c9e45dc99f7c58fdcab706e72698640c3f32b507f911a2e863ff1075444f569d9c3b2
-
Filesize
312B
MD5be88b5558028854abfd31e4a190e052a
SHA130acd5c01e8f8eddc777bc51c0e5f4b85965a3ae
SHA256d4f199062d65586b3caa05011b89e57ffa7b4b81253e331dd3008936c8be9f3b
SHA51257199f60b7b25b693a709945c5c3d13b91ca4165c915f24991a1907cd4c63e00337942dcd3e420eb28efd518d95f80d928c0b057103c57f2c767174c458d8daa