Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe
-
Size
996KB
-
MD5
d2218e8a847345f48ce6595ba1055e29
-
SHA1
468a985b52d39707425162e2c0a2a854c6e37d04
-
SHA256
48120198618df212b02b4e08c9c7a90aea6b61b831faf373733f47f09c0046f3
-
SHA512
c9d3110b77a56af7b3de8cf4152373f023e0ed86afe5008e6e71205ba84d0cd12bf5b4e3cf4c460276c154f633df271769b9e004ab112286538a00ea5170d884
-
SSDEEP
12288:Ta1SY/r3ESmI+Kd0s1Ke9p69PEAWRrEru722H+VEiaDk3DKsbHP:G13D3ESt+KysksphjK5f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fanosethiopiatours.com - Port:
587 - Username:
[email protected] - Password:
OPtamiue007
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2692-23-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2692-20-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2692-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2692-15-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2692-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2072 set thread context of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 2692 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2624 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2624 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2624 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2624 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2692 2072 d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gBNjJQsJcikp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE6B7.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2218e8a847345f48ce6595ba1055e29_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51239daa520ebe16cb2017f5cf0245d72
SHA1ce4f59526660dd582d3a1d647379fc5474b97d87
SHA2566b3779ed653d5025e46df0a50d14a377c6da0ff7cdea563626f69506690b3793
SHA5128fd89f411c1946413132e07cfd80c092c31cbb5d7ca80952b53a9a9f035d0c7424093f7448862261d4bbc8aea5ee534594b4af6ee712131d42f45105c21c1cbb