Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
-
Size
569KB
-
MD5
f12da21fcec70f5f7e7b35198259a88f
-
SHA1
04dfa1d27b34aed412ac2b799f4b01675767f8b9
-
SHA256
195d2a0a39642615534776e0c4eaa04ad2ac825f077e51a0f7c9697af9eecb6d
-
SHA512
987f6fa83e310b1aa26c61258b7354d8423b86afedd554c5763f9a1014e1df613f5a79dde094ed06082a67dcbec7b6632d9e2f4864d779cb846519ff966d0b1a
-
SSDEEP
12288:zKCz/ZLpo1y90NxqACSV90vrA68dM4zUbY/nO0bfLohY:zKCzNpo1yWM9OivrB4IbYW0bfeY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
blessing@12345
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 3 IoCs
resource yara_rule behavioral1/memory/2544-22-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla behavioral1/memory/2544-20-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla behavioral1/memory/2544-18-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 3020 lwXLHeMvJxwmJGFDma.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 3020 lwXLHeMvJxwmJGFDma.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lwXLHeMvJxwmJGFDma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2544 RegAsm.exe 2544 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3020 lwXLHeMvJxwmJGFDma.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2544 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3020 2404 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 30 PID 2404 wrote to memory of 3020 2404 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 30 PID 2404 wrote to memory of 3020 2404 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 30 PID 2404 wrote to memory of 3020 2404 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 PID 3020 wrote to memory of 2544 3020 lwXLHeMvJxwmJGFDma.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5ee963353d61ada115914ccd1af726ad0
SHA1ad4300872983e2378496b3fb9cbe7bbc05195d37
SHA256defa8046c7c8add1e2263ca620e95351c7cf6d02d0bbc74c924134dd96f0f891
SHA5124ea5c3b07b811c2e972b9440c6ce0d9c5eff357a6ee6865fb82022223cf69daa5695c3f52be0ee1adf560cd4e17179fa59541090b533101c093f4b10dc209fb5
-
Filesize
10KB
MD58c442dbb5387acdedd38684f969e1bfa
SHA1f6e6397777bbbc634ded67f72e76297184d2504d
SHA256cd0b4059e9ae095b50678e1d402f073a7f4f5f7e6ea1b3b115bdaf35e9353f02
SHA512c6f0e6b74df37a1c640a08b5ac9f5b0e9c77e4aacaf05630e2a602cf145e65a71f122b8f8f792faea19834b556d210597e809b0329a35252f73ba2fa2534c58a