Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 10:40

General

  • Target

    f830db1a5928b263f4c2d85177d5ccd0_JaffaCakes118.exe

  • Size

    996KB

  • MD5

    f830db1a5928b263f4c2d85177d5ccd0

  • SHA1

    96c132c104791b92d244aec47978231fefd0a462

  • SHA256

    b7100d4e869329857f90ba16e477f2c4c48c5727d22fbbe1527000e99c447ece

  • SHA512

    91344f6e3bc466ba37f6814d35b1011954f826f3e48b851c860e9dd4156ece35e3f7ee2b63c7c0ac96944c29741b319f73bd4f5e5bd3699c57073692bef10b89

  • SSDEEP

    12288:liGONYctrVs++Tt2OPWIIsM2A5JxOQqCycYqVhgnPSFYDVJ+ul:li7aMrVaTt2OPWRsPA/o2hgVDV

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mazayacom.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    H.wnlB&4PJyF

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f830db1a5928b263f4c2d85177d5ccd0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f830db1a5928b263f4c2d85177d5ccd0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HyDxqGGkgeXD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB25E.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2848
    • C:\Users\Admin\AppData\Local\Temp\f830db1a5928b263f4c2d85177d5ccd0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f830db1a5928b263f4c2d85177d5ccd0_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 520
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpB25E.tmp

    Filesize

    1KB

    MD5

    8f0e9695d71bda152daee944d3c06ef3

    SHA1

    cdce6c7497ec9c7d0d3d07c2eb0795a6483f029b

    SHA256

    8b444d8cd793f818402037b60071e0e0022d72d37348607131322cab5eccd3f7

    SHA512

    068251ffb768b69d858136037b36fef08d76734776c84a6e51b02da5351c9f7a06c6cf8402ffd9a04db379524219be871ac9855cc7b57a3667f68ca47ea6cc1b

  • memory/1652-0-0x0000000074BC1000-0x0000000074BC2000-memory.dmp

    Filesize

    4KB

  • memory/1652-1-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/1652-2-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/1652-3-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/1652-4-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/1652-25-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2668-12-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-19-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-15-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-13-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-10-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2668-24-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-27-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-26-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-28-0x0000000074BC0000-0x000000007516B000-memory.dmp

    Filesize

    5.7MB