Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
40359b10d6abf5315ad4989515c8cd85
-
SHA1
7ff721bba3042816f6f7fd282c93d270247dd20f
-
SHA256
2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647
-
SHA512
b1583343d928976d222fe9ac9857e2f73f324b853e04be40602db2425c51a56681ad992d1d2adb95da454f5ce5ca1a7731ef0a380d1d84ca5b112fb182145005
-
SSDEEP
24576:7bx5ACyRtvPExqgcSSu5bqhD92oK8t7yz5b/UXq60Lnyx2M3TttxnvZ:vAVRBPhbSFAhcKtYiq60LnKTVnR
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
efinancet.shop - Port:
587 - Username:
[email protected] - Password:
HCYis3WEB8!Z
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3448 snto.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snto.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 708 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe Token: SeDebugPrivilege 3448 snto.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3120 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 3120 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 91 PID 2728 wrote to memory of 2452 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 92 PID 2728 wrote to memory of 2452 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 92 PID 2728 wrote to memory of 2452 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 92 PID 2728 wrote to memory of 1648 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 93 PID 2728 wrote to memory of 1648 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 93 PID 2728 wrote to memory of 1648 2728 40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe 93 PID 2452 wrote to memory of 708 2452 cmd.exe 96 PID 2452 wrote to memory of 708 2452 cmd.exe 96 PID 2452 wrote to memory of 708 2452 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\snto\snto.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\snto\snto.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:708
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\40359b10d6abf5315ad4989515c8cd85_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\snto\snto.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\snto\snto.exeC:\Users\Admin\AppData\Roaming\snto\snto.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD540359b10d6abf5315ad4989515c8cd85
SHA17ff721bba3042816f6f7fd282c93d270247dd20f
SHA2562c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647
SHA512b1583343d928976d222fe9ac9857e2f73f324b853e04be40602db2425c51a56681ad992d1d2adb95da454f5ce5ca1a7731ef0a380d1d84ca5b112fb182145005