Resubmissions

26-09-2024 23:50

240926-3vls2avamn 10

27-08-2024 13:26

240827-qpnzzsvblm 10

Analysis

  • max time kernel
    24s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2024 13:26

General

  • Target

    c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe

  • Size

    705KB

  • MD5

    c515a556d7cc1fb7a476fb0fb1aadaaa

  • SHA1

    c5690d2abee36e06c2c40dceba693bc7eeeda7be

  • SHA256

    4ba67a000526a4abcf098ab1671fae28996f0db56a67bdeb36d2ef653e34c35b

  • SHA512

    ceb6047816345ad1767698982d448d48accc1e9b22f0fb7ca9c9233444523531b9ef672041dc73ce6a6b6f22fd7263ca882d6fb19288d0dd726cb7c0eb94a1a2

  • SSDEEP

    12288:0J0unggMGIwHJo8spfSPFWHw2Y8ZKk8mZfurZB+n3mfYBkU4f5YNmmh8o:luoG9priSPFWHw2Y8ZK5d22fYBkU4f5q

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yoqmiiwhxyjcorck

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\ProgramData\coded.exe
      "C:\ProgramData\coded.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          • System Location Discovery: System Language Discovery
          PID:2076
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holderwb.txt"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

    Filesize

    24B

    MD5

    717d227537a0be6a697f3badec5895c8

    SHA1

    8df80636d0a80d54ac950df4eae550c12bcfd82f

    SHA256

    0b4d17c6136ea4248f345cd61e0cb19908ee1a519959385151cc10043f7957d1

    SHA512

    5ae0a10530bb7dc828eb41ef8e50974426fb5fb2af9112804d15b8f31b0941579b934dbac5ebce01aeaacc48dbcac4378cd1d865c47ecbdf34631e6cb86fc73e

  • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • \ProgramData\coded.exe

    Filesize

    413KB

    MD5

    6f4527c944a09f03e5305f5703289da2

    SHA1

    08c05780d832707e88b3b37290d80f3d00e74157

    SHA256

    2070b034b0fad170c6d7b07f0ea417bd975cc97a74269cdebff9fb17b0843326

    SHA512

    d61aa7d56ee8989c86c201461cf6729efb87ca84cc1d31ea2928f50229ab621df0d7e0d21b14ef9a97185c7a225b9dccb983a3a72c035cee58c11e41740a0f2b

  • memory/1036-1-0x0000000000DD0000-0x0000000000E86000-memory.dmp

    Filesize

    728KB

  • memory/1036-2-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/1036-3-0x0000000004680000-0x00000000046FA000-memory.dmp

    Filesize

    488KB

  • memory/1036-4-0x0000000004890000-0x0000000004928000-memory.dmp

    Filesize

    608KB

  • memory/1036-14-0x0000000074420000-0x0000000074B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/1036-0-0x000000007442E000-0x000000007442F000-memory.dmp

    Filesize

    4KB

  • memory/2076-39-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-43-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-41-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2076-31-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-37-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-35-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2076-33-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2236-15-0x00000000703C0000-0x000000007096B000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-16-0x00000000703C0000-0x000000007096B000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-25-0x00000000703C0000-0x000000007096B000-memory.dmp

    Filesize

    5.7MB

  • memory/2236-13-0x00000000703C1000-0x00000000703C2000-memory.dmp

    Filesize

    4KB

  • memory/2384-47-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-46-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-57-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-56-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-53-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-51-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-49-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2384-63-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB