Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 13:26

General

  • Target

    a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe

  • Size

    610KB

  • MD5

    a9e83bcb97f41b4d4012d38070d39d55

  • SHA1

    d0599a45c23609d3daf01b9f47739522bd8513d8

  • SHA256

    1d0072a7e0d448774a0fb8ce79442eb785f4127d78f76950c26957e20c2fe480

  • SHA512

    094f8438a29b808decbc77cf11f584bd7b8ca31bb43de885c24d0a66d79488be31e32b1983dfe8f2460ddd388224feba114622365c16001fea8e46d3657f93c2

  • SSDEEP

    12288:uuIpsW5kLqcjz0nUHmQJ66l4hJ58qda3Gwipta/RIUS/F1Tdb0i5ZuRiK:uuqyOgOUHy6l4hJ5dda3GwzS/Fdddi

Malware Config

Signatures

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9e83bcb97f41b4d4012d38070d39d55_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\jhonbook\jhonbook.exe

    Filesize

    610KB

    MD5

    a9e83bcb97f41b4d4012d38070d39d55

    SHA1

    d0599a45c23609d3daf01b9f47739522bd8513d8

    SHA256

    1d0072a7e0d448774a0fb8ce79442eb785f4127d78f76950c26957e20c2fe480

    SHA512

    094f8438a29b808decbc77cf11f584bd7b8ca31bb43de885c24d0a66d79488be31e32b1983dfe8f2460ddd388224feba114622365c16001fea8e46d3657f93c2

  • memory/948-13-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/948-1-0x0000000000F60000-0x0000000000FFE000-memory.dmp

    Filesize

    632KB

  • memory/948-2-0x00000000009B0000-0x0000000000A48000-memory.dmp

    Filesize

    608KB

  • memory/948-3-0x0000000000B60000-0x0000000000BFE000-memory.dmp

    Filesize

    632KB

  • memory/948-4-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/948-0-0x00000000748AE000-0x00000000748AF000-memory.dmp

    Filesize

    4KB

  • memory/2292-12-0x0000000000FA0000-0x000000000103E000-memory.dmp

    Filesize

    632KB

  • memory/2292-14-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2292-15-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2292-22-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2820-21-0x0000000000400000-0x000000000049C000-memory.dmp

    Filesize

    624KB

  • memory/2820-19-0x0000000000400000-0x000000000049C000-memory.dmp

    Filesize

    624KB

  • memory/2820-16-0x0000000000400000-0x000000000049C000-memory.dmp

    Filesize

    624KB