Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2024 07:33

General

  • Target

    65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    65fdd9a6908f3fad268bda8f8eb02a81

  • SHA1

    8653566b42ad4e9512046bf47b3d05306b9e3a50

  • SHA256

    a04d1b6d23818af17d324ec5ff6e3de019b9dfc66880ab04b7c47ca9629ad336

  • SHA512

    98b21449cdf51f72ab37320387ea24d10cb051a275faf7ecc25a0f7d36ae41d40965460dc9a250fda15dc351ff18eb7bf19ae79ce1165ea43aeeb7326779791e

  • SSDEEP

    24576:ByrrTqw+DDyPEOkrWCUQDt/tvHPT2fXNvOo:MrXoDDhOk6QZVvvT2/

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.yekamuhendislik.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MuhasebE123*

Signatures

  • A310logger

    A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • A310logger Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rnVsEWY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp65BA.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:372
    • C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe"
      2⤵
        PID:1736
      • C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe"
        2⤵
          PID:3832
        • C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\65fdd9a6908f3fad268bda8f8eb02a81_JaffaCakes118.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5076
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe
            3⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • outlook_office_path
            • outlook_win_path
            PID:4080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp65BA.tmp

        Filesize

        1KB

        MD5

        b14fc63275a71d38664ffcabbd4f6c61

        SHA1

        68b3bfe38edaf3cbf69bd5eb2652123df06b0ea8

        SHA256

        9fa48331fb794a27848e3948292d5723258731fc5295f4ed417176b5f5fa414c

        SHA512

        ee5d6d8b286cadc3cf464d65cf3e71c3db67d24db0413d0f330e520f38a1becb762bb0394be530a2ae192880c4813745b90f5b1a6423b4b7504cc8bde7ed77d5

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\8D6HYI5LTN.zip

        Filesize

        285KB

        MD5

        40a9752d59f2883e40d928f85a749008

        SHA1

        c60fb58eff64a7969b46f3934766f991352eeb47

        SHA256

        ef95540ec8dae3d255439fb847d26397c265b5cccda5ed0d6b9ed3dda14a2820

        SHA512

        ce33985f91103315accb1039635488d7e144df264bab8e164c1f9844ce6923e1c9c76349f14542901887ffcbbbca40b92cf474126f0b94893e8af1f608464b3c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe

        Filesize

        689KB

        MD5

        91b41651e6e9ab352805c6d35a297d08

        SHA1

        11b8eaa7b7941461bc952b11ec3f07d25dcd1c2e

        SHA256

        0872abe29cc9231cdded3a44e02a7ea17f09cf2ac2bdbd7077065858829c3723

        SHA512

        b0b0d73f6ac7b6e9b39db0fa58931873143f6559c3b8d3db2d82d453045f75da94f3236b6c6c5200b52af6cacc038565eb2e9c6a834608dac0b0e8bb45b1e892

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\credentials.txt

        Filesize

        691B

        MD5

        055c857272026583a61e1b5821c69a24

        SHA1

        ec39d34f16487682801dd2b319554cbed57feca4

        SHA256

        190db16bb64995e3bdea04b9e6fc1994dacfea3253a7559732205b1d41362b84

        SHA512

        d7833c4651683e95959107e05b07b60d2e963b9fbecd0106b329e2087d1dfc9aedb962b334e22b6b462699cbce86097d4d50ce5d1310ad098e3531efaa4e204b

      • memory/4080-55-0x0000000000BB0000-0x0000000000C62000-memory.dmp

        Filesize

        712KB

      • memory/4080-54-0x00007FFC51DE3000-0x00007FFC51DE5000-memory.dmp

        Filesize

        8KB

      • memory/4528-10-0x00000000750A0000-0x0000000075850000-memory.dmp

        Filesize

        7.7MB

      • memory/4528-3-0x0000000005420000-0x00000000059C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4528-8-0x0000000004EA0000-0x0000000004EBE000-memory.dmp

        Filesize

        120KB

      • memory/4528-9-0x00000000750AE000-0x00000000750AF000-memory.dmp

        Filesize

        4KB

      • memory/4528-0-0x00000000750AE000-0x00000000750AF000-memory.dmp

        Filesize

        4KB

      • memory/4528-11-0x0000000005E60000-0x0000000005F2C000-memory.dmp

        Filesize

        816KB

      • memory/4528-12-0x0000000005BA0000-0x0000000005BFC000-memory.dmp

        Filesize

        368KB

      • memory/4528-6-0x00000000050A0000-0x00000000050F6000-memory.dmp

        Filesize

        344KB

      • memory/4528-1-0x0000000000270000-0x0000000000404000-memory.dmp

        Filesize

        1.6MB

      • memory/4528-2-0x0000000004D90000-0x0000000004E2C000-memory.dmp

        Filesize

        624KB

      • memory/4528-24-0x00000000750A0000-0x0000000075850000-memory.dmp

        Filesize

        7.7MB

      • memory/4528-5-0x0000000004E50000-0x0000000004E5A000-memory.dmp

        Filesize

        40KB

      • memory/4528-4-0x0000000004F10000-0x0000000004FA2000-memory.dmp

        Filesize

        584KB

      • memory/4528-7-0x00000000750A0000-0x0000000075850000-memory.dmp

        Filesize

        7.7MB

      • memory/5076-20-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/5076-18-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/5076-65-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB