Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
fa4ba824a689d6d8bf6738b41311951b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa4ba824a689d6d8bf6738b41311951b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ojbixxjlzk.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ojbixxjlzk.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/ojbixxjlzk.dll
-
Size
30KB
-
MD5
f5480d6c032845135dff9ebf66c46d76
-
SHA1
e76f6c75aca31ab5c1ff4695b45ec49daef23256
-
SHA256
13f7ffcefcbba343a302edaf9ceccefcf6dbae294bb9a735869d9f3fc7c522dd
-
SHA512
5164a9c8c470308a17a82f39209ea734893c7f5ccbafe9fe67bc98bb70432f46dd5faad61ad6dd8da86a88d89eb6deefb5d626abffd4ed8e8e72eba6c314d575
-
SSDEEP
768:5YH4sBQJDh7wN4Ce1UtpWOPO8P9MuVnu+OGTYgFD:5IBQJDKLPO8P9Pnu+OIh
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 4 IoCs
resource yara_rule behavioral3/memory/3008-1-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/3008-6-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/3008-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/3008-8-0x00000000001C0000-0x00000000001FC000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\bin2 = "C:\\Users\\Admin\\AppData\\Roaming\\bin2\\bin2.exe" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 3008 2204 rundll32.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3008 rundll32.exe 3008 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2188 wrote to memory of 2204 2188 rundll32.exe 30 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 PID 2204 wrote to memory of 3008 2204 rundll32.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ojbixxjlzk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ojbixxjlzk.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ojbixxjlzk.dll,#13⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1