Analysis Overview
SHA256
d5aee96036886e6791a1a704cc47e2ab892eec0998571e0cdba2a8ed6d9e4230
Threat Level: Known bad
The file 8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Agenttesla family
AgentTesla
AgentTesla payload
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Reads data files stored by FTP clients
Unsecured Credentials: Credentials In Files
Reads WinSCP keys stored on the system
Accesses Microsoft Outlook profiles
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
outlook_office_path
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
outlook_win_path
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-04 00:05
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-04 00:05
Reported
2024-11-04 01:15
Platform
win7-20241010-en
Max time kernel
145s
Max time network
122s
Command Line
Signatures
AgentTesla
Agenttesla family
AgentTesla payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2584 set thread context of 2512 | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
Network
Files
memory/2584-8-0x000000007294A000-0x000000007294B000-memory.dmp
memory/2584-7-0x0000000000650000-0x0000000000750000-memory.dmp
memory/2584-6-0x0000000000260000-0x0000000000261000-memory.dmp
memory/2584-9-0x0000000072940000-0x0000000072A93000-memory.dmp
memory/2584-19-0x0000000000650000-0x0000000000750000-memory.dmp
memory/2512-24-0x0000000000400000-0x0000000000441000-memory.dmp
memory/2584-26-0x0000000072940000-0x0000000072A93000-memory.dmp
memory/2584-25-0x0000000000400000-0x000000000047C000-memory.dmp
memory/2512-22-0x0000000000400000-0x0000000000441000-memory.dmp
memory/2512-20-0x0000000000400000-0x0000000000441000-memory.dmp
memory/2512-28-0x0000000000400000-0x000000000043C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-04 00:05
Reported
2024-11-04 01:11
Platform
win10v2004-20241007-en
Max time kernel
144s
Max time network
150s
Command Line
Signatures
AgentTesla
Agenttesla family
AgentTesla payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2848 set thread context of 4916 | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2848 wrote to memory of 4916 | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
| PID 2848 wrote to memory of 4916 | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
| PID 2848 wrote to memory of 4916 | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
| PID 2848 wrote to memory of 4916 | N/A | C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\8e2adb4c864fb6ef89b90d5039b22571_JaffaCakes118.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
Files
memory/2848-2-0x0000000077DE2000-0x0000000077DE3000-memory.dmp
memory/2848-3-0x0000000002A90000-0x0000000002A91000-memory.dmp
memory/2848-8-0x0000000000520000-0x0000000000620000-memory.dmp
memory/2848-9-0x0000000075A61000-0x0000000075A62000-memory.dmp
memory/2848-10-0x0000000075A30000-0x0000000075B8D000-memory.dmp
memory/2848-14-0x0000000000520000-0x0000000000620000-memory.dmp
memory/4916-21-0x0000000000400000-0x0000000000441000-memory.dmp
memory/2848-22-0x0000000000400000-0x000000000047C000-memory.dmp
memory/2848-23-0x0000000075A30000-0x0000000075B8D000-memory.dmp
memory/4916-25-0x0000000077DE2000-0x0000000077DE3000-memory.dmp
memory/4916-26-0x0000000001060000-0x0000000001061000-memory.dmp
memory/4916-27-0x0000000074DCE000-0x0000000074DCF000-memory.dmp
memory/4916-28-0x0000000000400000-0x000000000043C000-memory.dmp
memory/4916-29-0x0000000005D40000-0x00000000062E4000-memory.dmp
memory/4916-30-0x0000000005690000-0x0000000005722000-memory.dmp
memory/4916-31-0x0000000074DC0000-0x0000000075570000-memory.dmp
memory/4916-32-0x0000000005960000-0x00000000059FC000-memory.dmp
memory/4916-33-0x0000000005810000-0x0000000005828000-memory.dmp
memory/4916-34-0x00000000065A0000-0x0000000006606000-memory.dmp
memory/4916-35-0x0000000074DCE000-0x0000000074DCF000-memory.dmp
memory/4916-36-0x0000000074DC0000-0x0000000075570000-memory.dmp
memory/4916-37-0x0000000006890000-0x00000000068E0000-memory.dmp
memory/4916-38-0x0000000006800000-0x000000000680A000-memory.dmp