General
-
Target
d3f83c0381649d514b2dd5ad41768b33_JaffaCakes118
-
Size
3.8MB
-
Sample
240908-kpw3psyend
-
MD5
d3f83c0381649d514b2dd5ad41768b33
-
SHA1
d55e5d2e47bd221f1f3ef38ab28ca255ca4d8c69
-
SHA256
41038364ec149409b74f198baf99938e9b1bd769b1eda1c3a8fbe9fe1b78d606
-
SHA512
59b9a25544a07781262cbd54255e6e3a3f061254d59e524147e53685d83cf4fd8ae9267321e811222e5ef08afd65115121beba73ac5147af1a1f33cb48e5a533
-
SSDEEP
1536:Oq16RwEWQ54ZfPovdnSyvnqqOB5lPXQeeG22QVmr9G8FWDAOhWdTjxkxghc4vXaS:Oq1owlXZfPo1nSyvqqOB5qYQTYb
Static task
static1
Behavioral task
behavioral1
Sample
d3f83c0381649d514b2dd5ad41768b33_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1440824094:AAEKwzzW--kPnTlDeEhK5etIjA9T8kCtNeQ/sendDocument
Targets
-
-
Target
d3f83c0381649d514b2dd5ad41768b33_JaffaCakes118
-
Size
3.8MB
-
MD5
d3f83c0381649d514b2dd5ad41768b33
-
SHA1
d55e5d2e47bd221f1f3ef38ab28ca255ca4d8c69
-
SHA256
41038364ec149409b74f198baf99938e9b1bd769b1eda1c3a8fbe9fe1b78d606
-
SHA512
59b9a25544a07781262cbd54255e6e3a3f061254d59e524147e53685d83cf4fd8ae9267321e811222e5ef08afd65115121beba73ac5147af1a1f33cb48e5a533
-
SSDEEP
1536:Oq16RwEWQ54ZfPovdnSyvnqqOB5lPXQeeG22QVmr9G8FWDAOhWdTjxkxghc4vXaS:Oq1owlXZfPo1nSyvqqOB5qYQTYb
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Turns off Windows Defender SpyNet reporting
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1