Analysis

  • max time kernel
    145s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 18:36

General

  • Target

    531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe

  • Size

    961KB

  • MD5

    531d5d995233f8d2239f4f56a8e5388e

  • SHA1

    c0eebdb7022757508cce1b0b57b14c36d884f82a

  • SHA256

    d3497f2745d0d081f5e8de1f79e58fab450500d495680438e8dce13fe3f4043a

  • SHA512

    0247e9cab5f6687904c865f5512400f72eecc218b658a3df8e4e316ec3abdbe9babdfac1bb89cdddfa393c74c8b84abbdf663dab89adff2b3ba64cdbb116f819

  • SSDEEP

    24576:V0AcK8CtracGntNgwBevci/utURy7a7O8U:V0Kvar1eki/utjOOR

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • AgentTesla payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        PID:4104
      • C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        PID:688
      • C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe.log

    Filesize

    1KB

    MD5

    17573558c4e714f606f997e5157afaac

    SHA1

    13e16e9415ceef429aaf124139671ebeca09ed23

    SHA256

    c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

    SHA512

    f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

  • C:\Users\Admin\AppData\Local\Temp\3582-490\531d5d995233f8d2239f4f56a8e5388e_JaffaCakes118.exe

    Filesize

    920KB

    MD5

    3d4b1329fdcbc4efa3cebf3e0511a436

    SHA1

    8c0a7e98b0f7a3a0bde765f84957be58604e982e

    SHA256

    1c65db2ba951b557c38be3177040b36f25a7f586dbabe2f62ff1383e95c450ec

    SHA512

    43f291367e4356c6507a26d3d49af3c28cadc3bc73b49a78eb261cade17360eee014f539d095730a0bcca8cb7debe1be1e78f10e68ecbf4655962443cfa55d84

  • memory/3836-119-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/3836-110-0x0000000006F70000-0x0000000007008000-memory.dmp

    Filesize

    608KB

  • memory/3836-16-0x00000000056B0000-0x0000000005742000-memory.dmp

    Filesize

    584KB

  • memory/3836-17-0x00000000055F0000-0x00000000055FA000-memory.dmp

    Filesize

    40KB

  • memory/3836-18-0x00000000058C0000-0x0000000005916000-memory.dmp

    Filesize

    344KB

  • memory/3836-19-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/3836-20-0x0000000006DC0000-0x0000000006DD2000-memory.dmp

    Filesize

    72KB

  • memory/3836-14-0x0000000005610000-0x00000000056AC000-memory.dmp

    Filesize

    624KB

  • memory/3836-12-0x00000000738CE000-0x00000000738CF000-memory.dmp

    Filesize

    4KB

  • memory/3836-105-0x00000000738CE000-0x00000000738CF000-memory.dmp

    Filesize

    4KB

  • memory/3836-106-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/3836-13-0x0000000000CA0000-0x0000000000D8C000-memory.dmp

    Filesize

    944KB

  • memory/3836-111-0x00000000095A0000-0x00000000095DE000-memory.dmp

    Filesize

    248KB

  • memory/3836-15-0x0000000005C60000-0x0000000006204000-memory.dmp

    Filesize

    5.6MB

  • memory/4072-121-0x0000000005810000-0x0000000005828000-memory.dmp

    Filesize

    96KB

  • memory/4072-114-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4072-118-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/4072-120-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/4072-122-0x00000000062C0000-0x0000000006326000-memory.dmp

    Filesize

    408KB

  • memory/4072-123-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/4072-124-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/4072-125-0x00000000064D0000-0x0000000006520000-memory.dmp

    Filesize

    320KB

  • memory/4072-126-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/4072-127-0x00000000738C0000-0x0000000074070000-memory.dmp

    Filesize

    7.7MB

  • memory/5092-107-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5092-104-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5092-109-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB