Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 17:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3059cf89548babd7f883f6669403711b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3059cf89548babd7f883f6669403711b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/oezmnaybrma.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/oezmnaybrma.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3059cf89548babd7f883f6669403711b.exe
-
Size
464KB
-
MD5
3059cf89548babd7f883f6669403711b
-
SHA1
7c97d773f230f63eb7669370611986cd5c92f03a
-
SHA256
853384b95098ae2591328fad181230b71e49dc55935af66056d6e505500ab8fa
-
SHA512
6fefb43ceff9794466a4f88d98cc2a0e9fac47c8c9be2f3e0237da3e0302d2bdc2afbfe9fbb272bbe155423013411c9b09e13e9479a9ac9014b8d26fb3ed4b21
-
SSDEEP
12288:j4C8+ZqG3cAh/AT6yTMXgxyEl36ctAoikdgZ:rzcG3jh/ATryEl33yugZ
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/864-9-0x0000000000400000-0x0000000000457000-memory.dmp family_snakekeylogger behavioral1/memory/864-12-0x0000000000400000-0x0000000000457000-memory.dmp family_snakekeylogger behavioral1/memory/864-11-0x0000000000400000-0x0000000000457000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Loads dropped DLL 1 IoCs
pid Process 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2456 set thread context of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3059cf89548babd7f883f6669403711b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3059cf89548babd7f883f6669403711b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 864 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 864 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 2456 wrote to memory of 864 2456 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 31 PID 864 wrote to memory of 2824 864 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 32 PID 864 wrote to memory of 2824 864 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 32 PID 864 wrote to memory of 2824 864 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 32 PID 864 wrote to memory of 2824 864 JaffaCakes118_3059cf89548babd7f883f6669403711b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3059cf89548babd7f883f6669403711b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3059cf89548babd7f883f6669403711b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3059cf89548babd7f883f6669403711b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3059cf89548babd7f883f6669403711b.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8483⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5e3e7ada7af7f7560a909eee23348cce6
SHA18d41ded7481ee7f95816515c367116782932ef13
SHA256cba0d722c1e33b61881ac05c0db2cf088dd9702e76df979ab40f8c0dc1c053ab
SHA5128f80d8cc74c0add6a92fc4a3549db2633a1c71e10e192f12ca8fd8f223a99455f24d2aab441d3dce3fddd789b769b446613991cb54906deacc930e2f7e8d46f0