Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe
-
Size
802KB
-
MD5
300f3f1f1a66b1e440cbdc4efd14e2ef
-
SHA1
8e1043d8c4b2315fba6d8a9692846f8791c22436
-
SHA256
71609c370ed4d3d62069401d753b937faf2dc66c0003409999946f5eb1046816
-
SHA512
a176a7f2d87f8c77b72ad484f315af203502829ddbdaa2d24fe48d656bf65b3166f2cb452067e1b0ef8b4aaa3fa7a4daf32eee65a1b434e44a438e5b1c0c452e
-
SSDEEP
12288:tt0Q5JEq/y6INX6LRgU7e9OmunzkiL3TJjcKhX3ak0xN:/0kGq/wKgDO3QMJjcKhHaj
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.karanex.com - Port:
587 - Username:
[email protected] - Password:
roz%KtT3
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\MAINPROC.exe," reg.exe -
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2124-32-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
System Binary Proxy Execution: InstallUtil 1 TTPs 2 IoCs
Abuse InstallUtil to proxy execution of malicious code.
description ioc Process Key opened \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\InstallUtil.exe MAINPROC.exe File created C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation MAINPROC.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation smss.exe -
Executes dropped EXE 4 IoCs
pid Process 1940 MAINPROC.exe 2124 InstallUtil.exe 5008 smss.exe 812 smss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 2124 1940 MAINPROC.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAINPROC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 1940 MAINPROC.exe 1940 MAINPROC.exe 1940 MAINPROC.exe 1940 MAINPROC.exe 2124 InstallUtil.exe 2124 InstallUtil.exe 5008 smss.exe 812 smss.exe 812 smss.exe 812 smss.exe 1940 MAINPROC.exe 1940 MAINPROC.exe 1940 MAINPROC.exe 1940 MAINPROC.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe Token: SeDebugPrivilege 1940 MAINPROC.exe Token: SeDebugPrivilege 2124 InstallUtil.exe Token: SeDebugPrivilege 5008 smss.exe Token: SeDebugPrivilege 812 smss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2124 InstallUtil.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3616 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 87 PID 2336 wrote to memory of 3616 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 87 PID 2336 wrote to memory of 3616 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 87 PID 3616 wrote to memory of 1516 3616 cmd.exe 89 PID 3616 wrote to memory of 1516 3616 cmd.exe 89 PID 3616 wrote to memory of 1516 3616 cmd.exe 89 PID 2336 wrote to memory of 1940 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 90 PID 2336 wrote to memory of 1940 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 90 PID 2336 wrote to memory of 1940 2336 300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe 90 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 2124 1940 MAINPROC.exe 92 PID 1940 wrote to memory of 5008 1940 MAINPROC.exe 94 PID 1940 wrote to memory of 5008 1940 MAINPROC.exe 94 PID 1940 wrote to memory of 5008 1940 MAINPROC.exe 94 PID 5008 wrote to memory of 812 5008 smss.exe 98 PID 5008 wrote to memory of 812 5008 smss.exe 98 PID 5008 wrote to memory of 812 5008 smss.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\300f3f1f1a66b1e440cbdc4efd14e2ef_JaffaCakes118.exe"1⤵
- System Binary Proxy Execution: InstallUtil
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
C:\Users\Admin\AppData\Roaming\MAINPROC.exe"C:\Users\Admin\AppData\Roaming\MAINPROC.exe"2⤵
- System Binary Proxy Execution: InstallUtil
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
54B
MD586a21c3a4185acba882d0ad439c5f25e
SHA1c9d3483ed564597f30543d80921685801ed02929
SHA256b69dc469e42ac42f8f1e73c51cd1d1508b4285a5f5ff96283d34819de777104f
SHA512fa5731c1a5ba86354212a5bb23cb00fb21d62b6becebaa927a50e7a4bcd3a1d958565b93037535377c233a118b86a37840c02dd08a1e752c1c56a2ef53c70256
-
Filesize
56B
MD53250194993d3e09e333d912923012f76
SHA1e317c8c42aeceef75bc9680d1ccd1d6084a535fd
SHA2567c8e2a6e633f3803f6932841236d08a3506088180363c63319fb88ce940dca21
SHA512ce1a73def6ab6001164ccce09e25409828bb3e8f8207d11ebe8ab27fd77fe8111558c1710e07d243106c8210139937f7aba1b899ef93a0f73213fb70c02118f5
-
Filesize
802KB
MD5300f3f1f1a66b1e440cbdc4efd14e2ef
SHA18e1043d8c4b2315fba6d8a9692846f8791c22436
SHA25671609c370ed4d3d62069401d753b937faf2dc66c0003409999946f5eb1046816
SHA512a176a7f2d87f8c77b72ad484f315af203502829ddbdaa2d24fe48d656bf65b3166f2cb452067e1b0ef8b4aaa3fa7a4daf32eee65a1b434e44a438e5b1c0c452e