Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 03:03

General

  • Target

    df5f7665dd7143e8b03934ce0cb6bda8_JaffaCakes118.exe

  • Size

    543KB

  • MD5

    df5f7665dd7143e8b03934ce0cb6bda8

  • SHA1

    6095e3e8b00ce98364584d20a700fefa7963167d

  • SHA256

    f03aa3254a964c676c99d1b2e96ef0e84d4c81e3b0885debf8e49f731c3d4779

  • SHA512

    e844f49f4e1d00cc52f14113552a8d33c595db3aaddcf81c6374a449ee14a46f2efa13290f09f3136636a2a06eb49a55a6aa56f9dee86170746a9d8a8be143d4

  • SSDEEP

    12288:W07VNnviSv2zv1gDkpaoHsrfANWGEbDnMp3Tq4pH6lEPK:WKVFC2IaFrfAgGEXnM5vHGEP

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df5f7665dd7143e8b03934ce0cb6bda8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df5f7665dd7143e8b03934ce0cb6bda8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FfBwjfLmXy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDA2E.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1624
    • C:\Users\Admin\AppData\Local\Temp\df5f7665dd7143e8b03934ce0cb6bda8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\df5f7665dd7143e8b03934ce0cb6bda8_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpDA2E.tmp

    Filesize

    1KB

    MD5

    75fffbf73f80f02c53104002d2afb4a4

    SHA1

    1318d2b560e45fd249dc0b5b5fca477ca29ca56a

    SHA256

    d44633396c588236b246a43e4123bdc5281cef3603e2a534d1896a30697157eb

    SHA512

    159ea050e077115be52f5d6a0f8e33751935c0e099a4ee6c4206c495ad37ef84e2f38b70bdaa8c322ae5e9fb14a975b1852d24ab529e3d2f553c47819663a5f3

  • memory/412-10-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/412-3-0x0000000005870000-0x0000000005E14000-memory.dmp

    Filesize

    5.6MB

  • memory/412-12-0x00000000061E0000-0x00000000061E6000-memory.dmp

    Filesize

    24KB

  • memory/412-4-0x0000000005360000-0x00000000053F2000-memory.dmp

    Filesize

    584KB

  • memory/412-5-0x00000000052A0000-0x00000000052AA000-memory.dmp

    Filesize

    40KB

  • memory/412-6-0x0000000005400000-0x0000000005456000-memory.dmp

    Filesize

    344KB

  • memory/412-7-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/412-8-0x0000000005460000-0x0000000005478000-memory.dmp

    Filesize

    96KB

  • memory/412-13-0x00000000061F0000-0x0000000006230000-memory.dmp

    Filesize

    256KB

  • memory/412-0-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

    Filesize

    4KB

  • memory/412-11-0x0000000006180000-0x00000000061D8000-memory.dmp

    Filesize

    352KB

  • memory/412-2-0x00000000051F0000-0x000000000528C000-memory.dmp

    Filesize

    624KB

  • memory/412-9-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

    Filesize

    4KB

  • memory/412-1-0x00000000007E0000-0x000000000086E000-memory.dmp

    Filesize

    568KB

  • memory/412-22-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/1860-21-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/1860-19-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1860-23-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/1860-24-0x0000000004E90000-0x0000000004EA8000-memory.dmp

    Filesize

    96KB

  • memory/1860-25-0x0000000005D20000-0x0000000005D86000-memory.dmp

    Filesize

    408KB

  • memory/1860-26-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/1860-27-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB