Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 03:20

General

  • Target

    f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe

  • Size

    569KB

  • MD5

    f12da21fcec70f5f7e7b35198259a88f

  • SHA1

    04dfa1d27b34aed412ac2b799f4b01675767f8b9

  • SHA256

    195d2a0a39642615534776e0c4eaa04ad2ac825f077e51a0f7c9697af9eecb6d

  • SHA512

    987f6fa83e310b1aa26c61258b7354d8423b86afedd554c5763f9a1014e1df613f5a79dde094ed06082a67dcbec7b6632d9e2f4864d779cb846519ff966d0b1a

  • SSDEEP

    12288:zKCz/ZLpo1y90NxqACSV90vrA68dM4zUbY/nO0bfLohY:zKCzNpo1yWM9OivrB4IbYW0bfeY

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    blessing@12345

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f12da21fcec70f5f7e7b35198259a88f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:3616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDma.exe

    Filesize

    408KB

    MD5

    ee963353d61ada115914ccd1af726ad0

    SHA1

    ad4300872983e2378496b3fb9cbe7bbc05195d37

    SHA256

    defa8046c7c8add1e2263ca620e95351c7cf6d02d0bbc74c924134dd96f0f891

    SHA512

    4ea5c3b07b811c2e972b9440c6ce0d9c5eff357a6ee6865fb82022223cf69daa5695c3f52be0ee1adf560cd4e17179fa59541090b533101c093f4b10dc209fb5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lwXLHeMvJxwmJGFDz.dll

    Filesize

    10KB

    MD5

    8c442dbb5387acdedd38684f969e1bfa

    SHA1

    f6e6397777bbbc634ded67f72e76297184d2504d

    SHA256

    cd0b4059e9ae095b50678e1d402f073a7f4f5f7e6ea1b3b115bdaf35e9353f02

    SHA512

    c6f0e6b74df37a1c640a08b5ac9f5b0e9c77e4aacaf05630e2a602cf145e65a71f122b8f8f792faea19834b556d210597e809b0329a35252f73ba2fa2534c58a

  • memory/3616-23-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-26-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/3616-30-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-29-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-28-0x0000000006720000-0x000000000672A000-memory.dmp

    Filesize

    40KB

  • memory/3616-27-0x00000000064A0000-0x00000000064F0000-memory.dmp

    Filesize

    320KB

  • memory/3616-25-0x0000000005730000-0x0000000005748000-memory.dmp

    Filesize

    96KB

  • memory/3616-24-0x0000000005240000-0x00000000052DC000-memory.dmp

    Filesize

    624KB

  • memory/3616-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3616-21-0x00000000057F0000-0x0000000005D94000-memory.dmp

    Filesize

    5.6MB

  • memory/3616-22-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4576-19-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4576-20-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4576-7-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

    Filesize

    4KB

  • memory/4576-16-0x0000000005700000-0x0000000005756000-memory.dmp

    Filesize

    344KB

  • memory/4576-14-0x0000000004BE0000-0x0000000004C72000-memory.dmp

    Filesize

    584KB

  • memory/4576-9-0x0000000005070000-0x000000000559C000-memory.dmp

    Filesize

    5.2MB

  • memory/4576-15-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4576-8-0x0000000000080000-0x00000000000EC000-memory.dmp

    Filesize

    432KB

  • memory/4576-13-0x0000000004AD0000-0x0000000004AD8000-memory.dmp

    Filesize

    32KB

  • memory/4576-10-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB