Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 12:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c86a89bfbb6695378fb207de8578d206.ps1
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c86a89bfbb6695378fb207de8578d206.ps1
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c86a89bfbb6695378fb207de8578d206.ps1
-
Size
356KB
-
MD5
c86a89bfbb6695378fb207de8578d206
-
SHA1
f9a2ab9b571a77c51d5ef5ed90a1a62f4f0f98d5
-
SHA256
2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6
-
SHA512
9dec301fe44b8a4f6966a5de911ba8dd8ed60c56cb67008a12feb6c21a6924dd978e0f787dc286cbc530ea5b5a8a73d6c3bcfb7fc2079bbc257f6c4722daad12
-
SSDEEP
1536:EUKRwevEPGKAjHFTNva119BaPffP5Cfx54awKUZDpUfIvXN9Ll68JxE9g5qvEgzJ:NeG
Malware Config
Extracted
agenttesla
http://103.125.190.248/j/p12m/mawa/30b1acecbda6c5d6ed4c.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/620-28-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4796 set thread context of 620 4796 powershell.exe 86 -
pid Process 4796 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe 620 RegAsm.exe 620 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 620 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 620 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4796 wrote to memory of 5020 4796 powershell.exe 84 PID 4796 wrote to memory of 5020 4796 powershell.exe 84 PID 5020 wrote to memory of 1860 5020 csc.exe 85 PID 5020 wrote to memory of 1860 5020 csc.exe 85 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 PID 4796 wrote to memory of 620 4796 powershell.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c86a89bfbb6695378fb207de8578d206.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rya45rwh\rya45rwh.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8240.tmp" "c:\Users\Admin\AppData\Local\Temp\rya45rwh\CSC2A39FF8AC43045C9A1E8FE8B3BAF2A86.TMP"3⤵PID:1860
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f02baed5d6296facff84e6a787827f80
SHA120120f7a42784831d8bb82e6f6380f84e067628c
SHA256a0bc11eeb95078331c828f9df3c0be437aa89efe8bf51606afb25bc159e48508
SHA5129806e0aa8365e503c09a4a78ea4e6c3931f7ae29c562594755dd23da6c909a77242acbba847037d7ecdec74cdae7c2b4979a310f5b2f7732b1c2d04b6b26de4a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD5b53b18370574c9a99cce4de99178e40b
SHA16def0c0942ce8fbf763fce1280fa4c3941d81e52
SHA256f59ff15809704e45c658782a1b3a8d5d419113f5792bfad9c2031e9297e262b3
SHA5121370df28fa6ded28d3182c4ea28c53d76e620b224986f0da0ce2ca86414747e6250f6d3484a125f2741320b0d635bd548523b5666313adb0bf85ceecfbcad68d
-
Filesize
652B
MD573cf10bab1752787071f6f15ec7dd1c9
SHA1d604bd7d229e2a45b2a1ea28df59a86a6005a7c0
SHA2566af436a6f395414739a5690976d9da847982539d28a34e9f3ab98e412ed6650d
SHA512d16297b5681605128478888a9d85d622cadda15e89232c61e0886e5454b4cdbf2147aaa4fa9bfd3dc9c1ebd29ecb660ca9c9bc592409c9a6ad8d4edeae507350
-
Filesize
13KB
MD5e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
Filesize
327B
MD57d960a1a4d29f72743608d08b064cf47
SHA1d18120aab8332f0fead838b99493566671c5914f
SHA2560fec07e8e4c13d95ec814ead02994ca5759a90535541a0281a6991138c0c7816
SHA512bf6f4b1eb261742c04fefd700da7c7f94390044177f65151e5b49fcf71a6d5fdad20a3385fd9418cec0d3a9f176af72a4f85b1e92d891e8e6a13a2c1e60a2e10