Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe
-
Size
610KB
-
MD5
a9e83bcb97f41b4d4012d38070d39d55
-
SHA1
d0599a45c23609d3daf01b9f47739522bd8513d8
-
SHA256
1d0072a7e0d448774a0fb8ce79442eb785f4127d78f76950c26957e20c2fe480
-
SHA512
094f8438a29b808decbc77cf11f584bd7b8ca31bb43de885c24d0a66d79488be31e32b1983dfe8f2460ddd388224feba114622365c16001fea8e46d3657f93c2
-
SSDEEP
12288:uuIpsW5kLqcjz0nUHmQJ66l4hJ58qda3Gwipta/RIUS/F1Tdb0i5ZuRiK:uuqyOgOUHy6l4hJ5dda3GwzS/Fdddi
Malware Config
Signatures
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
resource yara_rule behavioral1/memory/948-3-0x0000000000B60000-0x0000000000BFE000-memory.dmp m00nd3v_logger -
Executes dropped EXE 2 IoCs
pid Process 2292 jhonbook.exe 2820 jhonbook.exe -
Loads dropped DLL 1 IoCs
pid Process 948 a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jhonbook = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\jhonbook\\jhonbook.exe" jhonbook.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhonbook = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\jhonbook\\jhonbook.exe" jhonbook.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2292 set thread context of 2820 2292 jhonbook.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 948 a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe Token: SeDebugPrivilege 2292 jhonbook.exe Token: SeDebugPrivilege 2820 jhonbook.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 948 wrote to memory of 2292 948 a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe 28 PID 948 wrote to memory of 2292 948 a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe 28 PID 948 wrote to memory of 2292 948 a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe 28 PID 948 wrote to memory of 2292 948 a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29 PID 2292 wrote to memory of 2820 2292 jhonbook.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD5a9e83bcb97f41b4d4012d38070d39d55
SHA1d0599a45c23609d3daf01b9f47739522bd8513d8
SHA2561d0072a7e0d448774a0fb8ce79442eb785f4127d78f76950c26957e20c2fe480
SHA512094f8438a29b808decbc77cf11f584bd7b8ca31bb43de885c24d0a66d79488be31e32b1983dfe8f2460ddd388224feba114622365c16001fea8e46d3657f93c2