Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2024, 00:59 UTC

General

  • Target

    5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe

  • Size

    717KB

  • MD5

    5a150f8752d5553cab3b640f33d0786e

  • SHA1

    72b30709a7d5a824ce8f00397c1602ddda1cb05b

  • SHA256

    c54c2f66a5691aa9b18c133ef391d36ae13cd4686ef4448ccd4ad5cb20d6e1d8

  • SHA512

    ab2827d7fd0da87e0cde3ca88a150d565027730ad9770b8df015d32805f02b9831a7bdf1c6f890f792b7c402a34fd47031619117fbb8a27f0b0a79fbcafda7a8

  • SSDEEP

    12288:kv9Lf/qlL2iNeHK7zgn1nyiV2BPWtgJ21xaCIRkdOwFllDOKtvalFFTof:kQR1bUn1tV2B+ACIKdOwFllD4po

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    newoffice@myexodus1.com
  • Password:
    jBgPrcvY6
  • Email To:
    newoffice@myexodus1.com

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 5 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kUSrPlGlQFx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp63B3.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2580
    • C:\Users\Admin\AppData\Local\Temp\5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe"
      2⤵
        PID:1224
      • C:\Users\Admin\AppData\Local\Temp\5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 1580
          3⤵
          • Program crash
          PID:1340

    Network

    • flag-us
      DNS
      checkip.dyndns.org
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      8.8.8.8:53
      Request
      checkip.dyndns.org
      IN A
      Response
      checkip.dyndns.org
      IN CNAME
      checkip.dyndns.com
      checkip.dyndns.com
      IN A
      193.122.6.168
      checkip.dyndns.com
      IN A
      158.101.44.242
      checkip.dyndns.com
      IN A
      193.122.130.0
      checkip.dyndns.com
      IN A
      132.226.247.73
      checkip.dyndns.com
      IN A
      132.226.8.169
    • flag-de
      GET
      http://checkip.dyndns.org/
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      193.122.6.168:80
      Request
      GET / HTTP/1.1
      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
      Host: checkip.dyndns.org
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Sat, 19 Oct 2024 01:00:21 GMT
      Content-Type: text/html
      Content-Length: 105
      Connection: keep-alive
      Cache-Control: no-cache
      Pragma: no-cache
      X-Request-ID: 0fc9942bcc655ade4e55a90ac0f19586
    • flag-de
      GET
      http://checkip.dyndns.org/
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      193.122.6.168:80
      Request
      GET / HTTP/1.1
      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
      Host: checkip.dyndns.org
      Response
      HTTP/1.1 200 OK
      Date: Sat, 19 Oct 2024 01:00:24 GMT
      Content-Type: text/html
      Content-Length: 105
      Connection: keep-alive
      Cache-Control: no-cache
      Pragma: no-cache
      X-Request-ID: 8ce64017c58dadef554b748f2e9302d9
    • flag-us
      DNS
      freegeoip.app
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      8.8.8.8:53
      Request
      freegeoip.app
      IN A
      Response
      freegeoip.app
      IN A
      172.67.160.84
      freegeoip.app
      IN A
      104.21.73.97
    • flag-us
      GET
      https://freegeoip.app/xml/138.199.29.44
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      172.67.160.84:443
      Request
      GET /xml/138.199.29.44 HTTP/1.1
      Host: freegeoip.app
      Connection: Keep-Alive
      Response
      HTTP/1.1 301 Moved Permanently
      Date: Sat, 19 Oct 2024 01:00:27 GMT
      Content-Type: text/html
      Content-Length: 167
      Connection: keep-alive
      Cache-Control: max-age=3600
      Expires: Sat, 19 Oct 2024 02:00:27 GMT
      Location: https://ipbase.com/xml/138.199.29.44
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JPOa7muAApwcgqgy6epqFYyxmAViRTFo1DuIBSLWkk%2BrsyhMkWSiMnm%2BIIEN2qFUkAoroD7MEVumgsHLiCGMJU%2BRCVMdzo106%2FJ67N0bQE4gaOsL2fOInwqM4ESxZ7Bz"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8d4cd4ce1c6c53a5-LHR
      alt-svc: h3=":443"; ma=86400
      server-timing: cfL4;desc="?proto=TCP&rtt=46826&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=368&delivery_rate=82888&cwnd=253&unsent_bytes=0&cid=12820576a2c0e727&ts=133&x=0"
    • flag-us
      DNS
      ipbase.com
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      8.8.8.8:53
      Request
      ipbase.com
      IN A
      Response
      ipbase.com
      IN A
      172.67.209.71
      ipbase.com
      IN A
      104.21.85.189
    • flag-us
      GET
      https://ipbase.com/xml/138.199.29.44
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      Remote address:
      172.67.209.71:443
      Request
      GET /xml/138.199.29.44 HTTP/1.1
      Host: ipbase.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 404 Not Found
      Date: Sat, 19 Oct 2024 01:00:27 GMT
      Content-Type: text/html; charset=utf-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      Age: 0
      Cache-Control: public,max-age=0,must-revalidate
      Cache-Status: "Netlify Edge"; fwd=miss
      Vary: Accept-Encoding
      X-Nf-Request-Id: 01JAH4MFFADCV2AMZK3GX1QJR7
      cf-cache-status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=376Bc2qtj2RmiMiWK0vk2CGEh8ZsZJgdfLretSIp1UPpcGbOPGrldnaxUwjlxwDknI4mAgTFdfGdVWkYjemFx2%2B2Ki8VVdGuL7kQ1dZJQLfcnMq8ny4QCK4VQA71"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8d4cd4cfcfc2bee9-LHR
      alt-svc: h3=":443"; ma=86400
      server-timing: cfL4;desc="?proto=TCP&rtt=46542&sent=6&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=365&delivery_rate=80817&cwnd=253&unsent_bytes=0&cid=35ed65e6084de3a3&ts=262&x=0"
    • 193.122.6.168:80
      http://checkip.dyndns.org/
      http
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      785 B
      776 B
      8
      3

      HTTP Request

      GET http://checkip.dyndns.org/

      HTTP Response

      200

      HTTP Request

      GET http://checkip.dyndns.org/

      HTTP Response

      200
    • 172.67.160.84:443
      https://freegeoip.app/xml/138.199.29.44
      tls, http
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      724 B
      4.2kB
      8
      7

      HTTP Request

      GET https://freegeoip.app/xml/138.199.29.44

      HTTP Response

      301
    • 172.67.209.71:443
      https://ipbase.com/xml/138.199.29.44
      tls, http
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      813 B
      7.5kB
      10
      12

      HTTP Request

      GET https://ipbase.com/xml/138.199.29.44

      HTTP Response

      404
    • 8.8.8.8:53
      checkip.dyndns.org
      dns
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      64 B
      176 B
      1
      1

      DNS Request

      checkip.dyndns.org

      DNS Response

      193.122.6.168
      158.101.44.242
      193.122.130.0
      132.226.247.73
      132.226.8.169

    • 8.8.8.8:53
      freegeoip.app
      dns
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      59 B
      91 B
      1
      1

      DNS Request

      freegeoip.app

      DNS Response

      172.67.160.84
      104.21.73.97

    • 8.8.8.8:53
      ipbase.com
      dns
      5a150f8752d5553cab3b640f33d0786e_JaffaCakes118.exe
      56 B
      88 B
      1
      1

      DNS Request

      ipbase.com

      DNS Response

      172.67.209.71
      104.21.85.189

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp63B3.tmp

      Filesize

      1KB

      MD5

      9a40ddfd6cc989e9adeb73a5d3565e19

      SHA1

      3f74042136a0d868c862a08351d3411ea6805017

      SHA256

      7e0e566eee4130a77e8a2ecb70e0d0aca993c1fb0f6c0853d14fae35686acf41

      SHA512

      d52b04260b389a6a890fa7bb6041b6d26979fb701240796d5271e339b9bba9bd3c97de0c6091605030a7be7080f0baf35376996bd534c8d58aafc1057c1355a5

    • memory/2556-0-0x000000007452E000-0x000000007452F000-memory.dmp

      Filesize

      4KB

    • memory/2556-1-0x0000000001040000-0x00000000010FA000-memory.dmp

      Filesize

      744KB

    • memory/2556-2-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2556-3-0x00000000004A0000-0x00000000004B6000-memory.dmp

      Filesize

      88KB

    • memory/2556-4-0x000000007452E000-0x000000007452F000-memory.dmp

      Filesize

      4KB

    • memory/2556-5-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2556-6-0x0000000005B50000-0x0000000005BE0000-memory.dmp

      Filesize

      576KB

    • memory/2556-7-0x0000000000650000-0x0000000000674000-memory.dmp

      Filesize

      144KB

    • memory/2556-28-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-15-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-24-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-27-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-22-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-26-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2644-19-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-17-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-13-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2644-29-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-30-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-31-0x0000000074520000-0x0000000074C0E000-memory.dmp

      Filesize

      6.9MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.