Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
-
Size
569KB
-
MD5
f12da21fcec70f5f7e7b35198259a88f
-
SHA1
04dfa1d27b34aed412ac2b799f4b01675767f8b9
-
SHA256
195d2a0a39642615534776e0c4eaa04ad2ac825f077e51a0f7c9697af9eecb6d
-
SHA512
987f6fa83e310b1aa26c61258b7354d8423b86afedd554c5763f9a1014e1df613f5a79dde094ed06082a67dcbec7b6632d9e2f4864d779cb846519ff966d0b1a
-
SSDEEP
12288:zKCz/ZLpo1y90NxqACSV90vrA68dM4zUbY/nO0bfLohY:zKCzNpo1yWM9OivrB4IbYW0bfeY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
blessing@12345
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3616-17-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 4576 lwXLHeMvJxwmJGFDma.exe -
Loads dropped DLL 1 IoCs
pid Process 4576 lwXLHeMvJxwmJGFDma.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4576 set thread context of 3616 4576 lwXLHeMvJxwmJGFDma.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lwXLHeMvJxwmJGFDma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3616 RegAsm.exe 3616 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4576 lwXLHeMvJxwmJGFDma.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3616 RegAsm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4576 3116 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 83 PID 3116 wrote to memory of 4576 3116 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 83 PID 3116 wrote to memory of 4576 3116 f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe 83 PID 4576 wrote to memory of 3616 4576 lwXLHeMvJxwmJGFDma.exe 86 PID 4576 wrote to memory of 3616 4576 lwXLHeMvJxwmJGFDma.exe 86 PID 4576 wrote to memory of 3616 4576 lwXLHeMvJxwmJGFDma.exe 86 PID 4576 wrote to memory of 3616 4576 lwXLHeMvJxwmJGFDma.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5ee963353d61ada115914ccd1af726ad0
SHA1ad4300872983e2378496b3fb9cbe7bbc05195d37
SHA256defa8046c7c8add1e2263ca620e95351c7cf6d02d0bbc74c924134dd96f0f891
SHA5124ea5c3b07b811c2e972b9440c6ce0d9c5eff357a6ee6865fb82022223cf69daa5695c3f52be0ee1adf560cd4e17179fa59541090b533101c093f4b10dc209fb5
-
Filesize
10KB
MD58c442dbb5387acdedd38684f969e1bfa
SHA1f6e6397777bbbc634ded67f72e76297184d2504d
SHA256cd0b4059e9ae095b50678e1d402f073a7f4f5f7e6ea1b3b115bdaf35e9353f02
SHA512c6f0e6b74df37a1c640a08b5ac9f5b0e9c77e4aacaf05630e2a602cf145e65a71f122b8f8f792faea19834b556d210597e809b0329a35252f73ba2fa2534c58a