Analysis
-
max time kernel
124s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 17:22
Behavioral task
behavioral1
Sample
202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe
-
Size
884KB
-
MD5
202f882a46b4f95ef5b3c161fdb00f06
-
SHA1
162181178d2f5a3d453e70bf1a369eedd89f103c
-
SHA256
62e5f86d7df3d239abf531c4f14b5f6e486c34a866e80603b43aa925f8910f75
-
SHA512
efbd3a74b355a9c7b02a169fd950686a1dafa3e8db5122b6787a65118fe77452d3b3aadc1634ab7a71eb0aa444187694f6000365ab02cbb893c25c330584e80a
-
SSDEEP
12288:pYV6MorX7qzuC3QHO9FQVHPF51jgcgM751HzqhodTWjaX2IOXF3pWzEXVzJhCWQH:eBXu9HGaVHbHHWaXxQ1pWgZJAnRzl
Malware Config
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@Rocking11.
Signatures
-
NirSoft MailPassView 7 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1084-15-0x0000000000090000-0x0000000000114000-memory.dmp MailPassView behavioral1/memory/1084-9-0x0000000000090000-0x0000000000114000-memory.dmp MailPassView behavioral1/memory/1084-16-0x0000000000090000-0x0000000000114000-memory.dmp MailPassView behavioral1/memory/2732-22-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/2732-24-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/2732-26-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/2732-29-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 7 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1084-15-0x0000000000090000-0x0000000000114000-memory.dmp WebBrowserPassView behavioral1/memory/1084-9-0x0000000000090000-0x0000000000114000-memory.dmp WebBrowserPassView behavioral1/memory/1084-16-0x0000000000090000-0x0000000000114000-memory.dmp WebBrowserPassView behavioral1/memory/1888-31-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1888-32-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1888-33-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1888-38-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 11 IoCs
resource yara_rule behavioral1/memory/1084-15-0x0000000000090000-0x0000000000114000-memory.dmp Nirsoft behavioral1/memory/1084-9-0x0000000000090000-0x0000000000114000-memory.dmp Nirsoft behavioral1/memory/1084-16-0x0000000000090000-0x0000000000114000-memory.dmp Nirsoft behavioral1/memory/2732-22-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2732-24-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2732-26-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2732-29-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1888-31-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1888-32-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1888-33-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1888-38-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\igfxTray.url 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2852-0-0x0000000000CE0000-0x0000000000EC5000-memory.dmp upx behavioral1/memory/2852-18-0x0000000000CE0000-0x0000000000EC5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com 7 whatismyipaddress.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2852-18-0x0000000000CE0000-0x0000000000EC5000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2852 set thread context of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 1084 set thread context of 2732 1084 RegAsm.exe 30 PID 1084 set thread context of 1888 1084 RegAsm.exe 31 -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 2852 wrote to memory of 1084 2852 202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe 28 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 2732 1084 RegAsm.exe 30 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31 PID 1084 wrote to memory of 1888 1084 RegAsm.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\202f882a46b4f95ef5b3c161fdb00f06_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:1888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84