Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/01/2025, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_77b1842a248351261230580611b97982.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_77b1842a248351261230580611b97982.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_77b1842a248351261230580611b97982.exe
-
Size
493KB
-
MD5
77b1842a248351261230580611b97982
-
SHA1
3963201c3477343ac52dd547543a6797cd432f17
-
SHA256
db874f432a29e4ef462ce3c49c3ce21653ca5e6fd3c88d62f1f1bed9d6d046df
-
SHA512
a401187cf31ba0704fa0ddbd38f86c8b3bde074bb75d808309a18342cf57dc149b2164799594a691e7eb794f81b4e3f72ab046d9c042a9717488a35d3867ac9f
-
SSDEEP
12288:qbarykPQ8ZNkWP53eqBELQEwOi/t1p5/D9tGqmoS7l:qbWJfZR3ZFEo//9tGq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.renlk.me - Port:
587 - Username:
[email protected] - Password:
Alipapa18@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 33 IoCs
resource yara_rule behavioral1/memory/1048-5-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-6-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-8-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-10-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-12-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-14-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-16-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-18-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-20-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-22-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-24-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-26-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-28-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-30-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-32-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-34-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-36-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-38-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-40-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-42-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-44-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-46-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-48-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-50-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-60-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-68-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-66-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-64-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-62-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-58-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-56-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-54-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla behavioral1/memory/1048-52-0x00000000023C0000-0x000000000240B000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77b1842a248351261230580611b97982.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 JaffaCakes118_77b1842a248351261230580611b97982.exe 1048 JaffaCakes118_77b1842a248351261230580611b97982.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 JaffaCakes118_77b1842a248351261230580611b97982.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77b1842a248351261230580611b97982.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77b1842a248351261230580611b97982.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048