Malware Analysis Report

2024-09-22 10:47

Sample ID 240711-r757natcrg
Target 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118
SHA256 7c4bf29e8ed9f775fb2420ca56883196935cd0b6f4ccee62058818034caf8c96
Tags
hawkeye keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7c4bf29e8ed9f775fb2420ca56883196935cd0b6f4ccee62058818034caf8c96

Threat Level: Known bad

The file 3993696c0cc918c566ad9c89b5be2593_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

hawkeye keylogger persistence spyware stealer trojan

HawkEye

Adds policy Run key to start application

Drops startup file

Loads dropped DLL

Reads data files stored by FTP clients

Reads local data of messenger clients

Checks computer location settings

Reads user/profile data of web browsers

Deletes itself

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Program crash

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-07-11 14:51

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-11 14:51

Reported

2024-07-11 14:53

Platform

win7-20240704-en

Max time kernel

150s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe"

Signatures

HawkEye

keylogger trojan stealer spyware hawkeye

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Drops startup file

Description Indicator Process Target
File opened for modification C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
File created C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads local data of messenger clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2648 set thread context of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2556 set thread context of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2072 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2072 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2072 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2072 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2648 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 2648 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 2648 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 2648 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 2640 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2640 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2640 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2640 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 2556 wrote to memory of 832 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

"C:\Users\Admin\AppData\Local\Temp\svchost.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe

"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"

C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"

C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 smtp.gmail.com udp
NL 142.250.102.108:587 smtp.gmail.com tcp
NL 142.250.102.108:587 smtp.gmail.com tcp

Files

memory/2072-0-0x0000000074491000-0x0000000074492000-memory.dmp

memory/2072-1-0x0000000074490000-0x0000000074A3B000-memory.dmp

memory/2072-3-0x0000000074490000-0x0000000074A3B000-memory.dmp

\Users\Admin\AppData\Local\Temp\svchost.exe

MD5 3993696c0cc918c566ad9c89b5be2593
SHA1 c119e09a1ab2a2d5aeccc588d0406a4ee5f16f7a
SHA256 7c4bf29e8ed9f775fb2420ca56883196935cd0b6f4ccee62058818034caf8c96
SHA512 9b0d289c69c9d4e93779d1b82e9442f851e1ca2f2fd73e25192c6944cf5f52321509fe9f07553808a59bef5a2c851c384057d3b206045090ffef6b632d129ca5

memory/2072-18-0x0000000074490000-0x0000000074A3B000-memory.dmp

memory/2648-19-0x0000000074490000-0x0000000074A3B000-memory.dmp

memory/2648-23-0x0000000074490000-0x0000000074A3B000-memory.dmp

memory/2648-22-0x0000000074490000-0x0000000074A3B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe

MD5 2e18e07194565987ef816f36c4a2134e
SHA1 5278b14dc0704abd700264bb9f8610caf5d007eb
SHA256 44c927820ec11111ab620bfa75b71986b9e675770a782e3c740040d484e5dbd7
SHA512 7160e14ec359e738e77afed6341890a8084605543e7deb8720457825ff013b907e7233cc890a8c63614b4d481bc73fb72cf15378d8f3534dfb9c8064fed6f930

C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

MD5 c5ddc70af709b8c36260a10e9d37be9e
SHA1 4494984a1968a6053068d73d27de75a66c17f7cf
SHA256 39e1cea64f487ab34ed56c9164c90330d224dbd0ddc314beb657909420eb96ff
SHA512 3da0de610e81b05a7245851848e961326095b962ef1d37e212b37edf70256a526fbe8d58abedb2ada3141f858936a1fecba35f4909c1c98bc03dbe9e54736ec7

memory/2756-36-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2756-41-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2756-39-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2756-34-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2756-32-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2756-30-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2756-44-0x0000000074490000-0x0000000074A3B000-memory.dmp

memory/2756-28-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2756-26-0x0000000000400000-0x0000000000434000-memory.dmp

memory/832-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2648-64-0x0000000074490000-0x0000000074A3B000-memory.dmp

memory/2756-65-0x0000000074490000-0x0000000074A3B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-11 14:51

Reported

2024-07-11 14:53

Platform

win10v2004-20240709-en

Max time kernel

150s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe"

Signatures

HawkEye

keylogger trojan stealer spyware hawkeye

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Drops startup file

Description Indicator Process Target
File opened for modification C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
File created C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads local data of messenger clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1376 set thread context of 4740 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 548 set thread context of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1924 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1924 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1924 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1376 wrote to memory of 4740 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1376 wrote to memory of 4740 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1376 wrote to memory of 4740 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1376 wrote to memory of 4740 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1376 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 1376 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 1376 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe
PID 1780 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 1780 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 1780 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe
PID 548 wrote to memory of 3580 N/A C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\3993696c0cc918c566ad9c89b5be2593_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

"C:\Users\Admin\AppData\Local\Temp\svchost.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 4740

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 84

C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe

"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"

C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"

C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 smtp.gmail.com udp
NL 142.250.102.109:587 smtp.gmail.com tcp
US 8.8.8.8:53 109.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
NL 142.250.102.109:587 smtp.gmail.com tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

memory/1924-0-0x0000000074E72000-0x0000000074E73000-memory.dmp

memory/1924-1-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/1924-2-0x0000000074E70000-0x0000000075421000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svchost.exe

MD5 3993696c0cc918c566ad9c89b5be2593
SHA1 c119e09a1ab2a2d5aeccc588d0406a4ee5f16f7a
SHA256 7c4bf29e8ed9f775fb2420ca56883196935cd0b6f4ccee62058818034caf8c96
SHA512 9b0d289c69c9d4e93779d1b82e9442f851e1ca2f2fd73e25192c6944cf5f52321509fe9f07553808a59bef5a2c851c384057d3b206045090ffef6b632d129ca5

memory/1376-17-0x0000000074E70000-0x0000000075421000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe

MD5 2e18e07194565987ef816f36c4a2134e
SHA1 5278b14dc0704abd700264bb9f8610caf5d007eb
SHA256 44c927820ec11111ab620bfa75b71986b9e675770a782e3c740040d484e5dbd7
SHA512 7160e14ec359e738e77afed6341890a8084605543e7deb8720457825ff013b907e7233cc890a8c63614b4d481bc73fb72cf15378d8f3534dfb9c8064fed6f930

memory/1376-21-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/1924-18-0x0000000074E70000-0x0000000075421000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

MD5 c5ddc70af709b8c36260a10e9d37be9e
SHA1 4494984a1968a6053068d73d27de75a66c17f7cf
SHA256 39e1cea64f487ab34ed56c9164c90330d224dbd0ddc314beb657909420eb96ff
SHA512 3da0de610e81b05a7245851848e961326095b962ef1d37e212b37edf70256a526fbe8d58abedb2ada3141f858936a1fecba35f4909c1c98bc03dbe9e54736ec7

memory/1780-25-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/1780-26-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/1780-27-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/3580-30-0x0000000000400000-0x0000000000434000-memory.dmp

memory/1376-35-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/1376-36-0x0000000074E70000-0x0000000075421000-memory.dmp

memory/1780-37-0x0000000074E70000-0x0000000075421000-memory.dmp