Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 18:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe
-
Size
558KB
-
MD5
3446b3427eb52e09af7b7424d8bd6dc3
-
SHA1
780f36db6bdafed0966c2951e86142b43105f0f2
-
SHA256
0cc6f444f52c66cd955fa64184e8784b8ec735a0d8b2f1f4c060532fcd54e9f8
-
SHA512
7596395c37d037bff11dcf9e3f59039602b965c9cd36fedf344ef83dff3cce5c80aec345d4eaee4ecc2b5036b6a34473f7f31d3291d651baeddad762e5c7fbfe
-
SSDEEP
12288:D2RF+X3KvUtD+rXHFFqsxxxxxxxxxxxxxxxxxxxxxxxxKnABdo4:WUtKFgsxxxxxxxxxxxxxxxxxxxxxxxxZ
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
budgetn.shop - Port:
587 - Username:
[email protected] - Password:
eC~Z,TG&S9jM - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/3256-6-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation dfxzdg.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 dfxzdg.exe -
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 checkip.dyndns.org 16 freegeoip.app 17 freegeoip.app -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1520 set thread context of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 4080 set thread context of 2232 4080 dfxzdg.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 232 3256 WerFault.exe 82 2792 2232 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe 696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3256 vbc.exe 2232 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe Token: SeDebugPrivilege 3256 vbc.exe Token: SeDebugPrivilege 4080 dfxzdg.exe Token: SeDebugPrivilege 2232 vbc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3256 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 82 PID 1520 wrote to memory of 3108 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 83 PID 1520 wrote to memory of 3108 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 83 PID 1520 wrote to memory of 3108 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 83 PID 1520 wrote to memory of 2456 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 85 PID 1520 wrote to memory of 2456 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 85 PID 1520 wrote to memory of 2456 1520 JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe 85 PID 3108 wrote to memory of 2512 3108 cmd.exe 87 PID 3108 wrote to memory of 2512 3108 cmd.exe 87 PID 3108 wrote to memory of 2512 3108 cmd.exe 87 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2232 4080 dfxzdg.exe 97 PID 4080 wrote to memory of 2828 4080 dfxzdg.exe 100 PID 4080 wrote to memory of 2828 4080 dfxzdg.exe 100 PID 4080 wrote to memory of 2828 4080 dfxzdg.exe 100 PID 4080 wrote to memory of 3836 4080 dfxzdg.exe 101 PID 4080 wrote to memory of 3836 4080 dfxzdg.exe 101 PID 4080 wrote to memory of 3836 4080 dfxzdg.exe 101 PID 2828 wrote to memory of 696 2828 cmd.exe 104 PID 2828 wrote to memory of 696 2828 cmd.exe 104 PID 2828 wrote to memory of 696 2828 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 17643⤵
- Program crash
PID:232
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3446b3427eb52e09af7b7424d8bd6dc3.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3256 -ip 32561⤵PID:4984
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeC:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 14563⤵
- Program crash
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 2232 -ip 22321⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD53446b3427eb52e09af7b7424d8bd6dc3
SHA1780f36db6bdafed0966c2951e86142b43105f0f2
SHA2560cc6f444f52c66cd955fa64184e8784b8ec735a0d8b2f1f4c060532fcd54e9f8
SHA5127596395c37d037bff11dcf9e3f59039602b965c9cd36fedf344ef83dff3cce5c80aec345d4eaee4ecc2b5036b6a34473f7f31d3291d651baeddad762e5c7fbfe