Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/yenf.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/yenf.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe
-
Size
519KB
-
MD5
65ec3c266fbb29c78bd931faa10c7947
-
SHA1
e5dfa9b4f41ad608b7cf26040a83ecbc4e4378af
-
SHA256
9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1
-
SHA512
8823e7eccbfa351e1fdf71a2f1c0a8430a37ce10bb3d11facf269408263a269c22fcccfd5cbf449693f894eccb780bf9f10f4f93248b506d641de098c6bab592
-
SSDEEP
6144:rGiP8k7NOQlfIFvnqzp6uAH8PiIIDNvFSsEIxIfFMIgvcVWRYeciBMh0nn5mpU4r:YD8faqM8PpIDtz+v8Yefp+j2GMkgmT
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Blustealer family
-
Loads dropped DLL 1 IoCs
pid Process 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31 PID 2172 wrote to memory of 2796 2172 JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9490a96656c76f667feb406d7a08c9a0a44eca1c8151ed6999000179549a92b1.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD546c925d5eaaaf5a7cdd55ffc845d037c
SHA1df0fc5da0fd9a0d288abac007e2ce470911fe25d
SHA256649b6cf91616337859aa74ec46fbdcfed6859475bb689c49c84eafdf33f796ec
SHA5129e124847e59a37ad9c11fdd94e5a8e0b4e93a273c43daecf2d357c94ffb55387b7070b45af688566a9d762cb7ad78cd4412b84ff32892a6fb7c8a7c8c3d53373