Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe
-
Size
410KB
-
MD5
d49652f293d246529d2102c8e962d85e
-
SHA1
04e31d28408be9d2963d402f368a880987b3851c
-
SHA256
5d29602ace80728915a5dcbcf3fdb46bc8a82bc5dacbe0c339cd9b544fbc17fc
-
SHA512
1e1c43fc685549bafc8be9d29f7f97935874b215e7b435d652eedce9c9946bb4370f2e41e3e6476ed0fabd3deaceab02f4f715e5d3475285802b170afee003af
-
SSDEEP
6144:QsVn8Y/2+3x5spUN1yY0zyZcVFVmPE45Ono0n4ed9PcTJpCvQLF:t58WhWmNEYOypPE450n4ewTJk
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.petrotos.gr - Port:
587 - Username:
[email protected] - Password:
Tiger@456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2920-409-0x00000000000F0000-0x000000000012C000-memory.dmp family_agenttesla -
System Binary Proxy Execution: InstallUtil 1 TTPs 2 IoCs
Abuse InstallUtil to proxy execution of malicious code.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe Key opened \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\InstallUtil.exe system32.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 880 system32.exe 2920 InstallUtil.exe -
Loads dropped DLL 4 IoCs
pid Process 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 880 system32.exe 880 system32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\system32 = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\system32.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 880 set thread context of 2920 880 system32.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 880 system32.exe 2920 InstallUtil.exe 2920 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe Token: SeDebugPrivilege 880 system32.exe Token: SeDebugPrivilege 2920 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2988 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2988 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2988 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2988 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 31 PID 2988 wrote to memory of 1236 2988 cmd.exe 33 PID 2988 wrote to memory of 1236 2988 cmd.exe 33 PID 2988 wrote to memory of 1236 2988 cmd.exe 33 PID 2988 wrote to memory of 1236 2988 cmd.exe 33 PID 2464 wrote to memory of 880 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 34 PID 2464 wrote to memory of 880 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 34 PID 2464 wrote to memory of 880 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 34 PID 2464 wrote to memory of 880 2464 d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe 34 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36 PID 880 wrote to memory of 2920 880 system32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d49652f293d246529d2102c8e962d85e_JaffaCakes118.exe"1⤵
- System Binary Proxy Execution: InstallUtil
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v system32 /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v system32 /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1236
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system32.exe"2⤵
- System Binary Proxy Execution: InstallUtil
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
Filesize
410KB
MD5d49652f293d246529d2102c8e962d85e
SHA104e31d28408be9d2963d402f368a880987b3851c
SHA2565d29602ace80728915a5dcbcf3fdb46bc8a82bc5dacbe0c339cd9b544fbc17fc
SHA5121e1c43fc685549bafc8be9d29f7f97935874b215e7b435d652eedce9c9946bb4370f2e41e3e6476ed0fabd3deaceab02f4f715e5d3475285802b170afee003af