Analysis
-
max time kernel
57s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/10/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe
-
Size
434KB
-
MD5
4d2e36e66c0a6b7552b97bd5034fdcbb
-
SHA1
9bc9f2fd6c25810ee03a0512a8e3e621c0b1e8ad
-
SHA256
22be2df4064414d9208f52a39a0fa6dd03b3a4ce83f8702abb901573435f8b23
-
SHA512
ac8a8862baa8d379bcdd153ba4963b23b1b60a4f3adef7fc107418cf9bcc81220a25bba9db69d27f8bd5ef35611419829ef9b435d39e8b78275b1fefa3b7c060
-
SSDEEP
6144:Oy/wN2rJ33Fx3uFDUoz3i4IqYqTmIn6jgto/uAI/7k0NNXtUaQeVVZtDw8XDFOkm:OIrFrjSi4IqYfRgtkyTdUXi3zFwVK4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mohhg.com - Port:
587 - Username:
[email protected] - Password:
QmlgN@@qt$53
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2728-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2728-19-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2728-23-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2728-22-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2728-15-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2912 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2912 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2912 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2912 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 29 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2728 2328 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2284 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 32 PID 2728 wrote to memory of 2284 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 32 PID 2728 wrote to memory of 2284 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 32 PID 2728 wrote to memory of 2284 2728 4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NNBvRA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9A0E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\4d2e36e66c0a6b7552b97bd5034fdcbb_JaffaCakes118.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5243⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e1aa7f7b5dda877867b1defeefb0e136
SHA1dcad459ba123da95768deedec7b885dc9d55951f
SHA256e2a5ea71af2e2be29ac55fefa6252bf0c3d5689b86cebedd5af14b7666fdb1b0
SHA5129aafd5b775babbe0698b7623ab98ce7f513239abd36bb280a7d49a42633a4be8246b1995d12d716232d231ded72d7994779890c7f2eb62193a6de18ff7679317