Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jzmc.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jzmc.dll
Resource
win10v2004-20240709-en
General
-
Target
391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe
-
Size
432KB
-
MD5
391d8025ebeb784e53f76c6536aa6fe6
-
SHA1
e9ac084345ba307473cbcf82846e0fc4be8d26e6
-
SHA256
3a400fbdc47f573a48a5f3052b0b4e67614b27607232dc448d11acf15b6baf8e
-
SHA512
de0ed92b7bfc4bfe1b15a539311677d288ec7ed66374adc39edfd60bf5094ac99a387d93213a5790f0dac121ef38145888e2e23023404cdfd871c2eca785a4c8
-
SSDEEP
6144:b8LxBBXsdAsRN+ciV3RGt+CgPq2ZvrnfIT6GcUYVo5DaXYuWwxR8FjoLGzxbecQU:ysNN+cilRTrfI2Z0s7hx6tzgBQs3ar7H
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1838876767:AAEiDKTcT_A4WBwpMo9nnrtBP7OvsmEUnNU/sendMessage?chat_id=1300181783
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 1 IoCs
pid Process 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2428 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2428 1984 391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\391d8025ebeb784e53f76c6536aa6fe6_JaffaCakes118.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD574d5048bbcdd145406c1401705d19b01
SHA1699ddbba611ec8467c1c7e92c3226d432139c16e
SHA2567401f524da5c86ef8d102c6b3196e4eec962a32883bcc74b5a1ecaa1ae2a7a6d
SHA512d0817195e8d770502e9cf8d4438cf7d09dd2fa5523041f81466ea3c9324d8e43899c2ad9b675b08cc900adc7176db82008cd95ef5c9ff12171016e2d319aa6ca