Analysis
-
max time kernel
120s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe
-
Size
835KB
-
MD5
2565a0f4855df3eabd24416d98e0a4c0
-
SHA1
379bcb29b4899157f59862d901acb577bc250ee8
-
SHA256
c382978c4fbc471e61a6c4d874c41231f38da448436a36638d460ce79a272b2c
-
SHA512
ccf4f5853c627ced3b55f583c8c6e34ea9e5d0ed9dde661609ba0d0988305d07e59f6c6cbee78cd6c22ee5a03ae5d34154db370e1994b06b8be8aeeadf9abeec
-
SSDEEP
12288:QYR3JrNmiQEU6BVwU8Ftib/09ffhg5IA/D5q2vyZLswmNsvhvXLepqc:QYpJrNG6+U8DiSfhg5IUPvylssb
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://bitrix370.timeweb.ru/ - Port:
21 - Username:
cn94754 - Password:
c2eitfpidhgS
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exedescription pid process target process PID 2372 set thread context of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1560 2620 WerFault.exe MSBuild.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
MSBuild.exepid process 2620 MSBuild.exe 2620 MSBuild.exe 2620 MSBuild.exe 2620 MSBuild.exe 2620 MSBuild.exe 2620 MSBuild.exe 2620 MSBuild.exe 2620 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 2620 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exeMSBuild.exedescription pid process target process PID 2372 wrote to memory of 2024 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe schtasks.exe PID 2372 wrote to memory of 2024 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe schtasks.exe PID 2372 wrote to memory of 2024 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe schtasks.exe PID 2372 wrote to memory of 2024 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe schtasks.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2372 wrote to memory of 2620 2372 2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe MSBuild.exe PID 2620 wrote to memory of 1560 2620 MSBuild.exe WerFault.exe PID 2620 wrote to memory of 1560 2620 MSBuild.exe WerFault.exe PID 2620 wrote to memory of 1560 2620 MSBuild.exe WerFault.exe PID 2620 wrote to memory of 1560 2620 MSBuild.exe WerFault.exe -
outlook_office_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2565a0f4855df3eabd24416d98e0a4c0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LZoVpQPinOT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1D50.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 10723⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1D50.tmpFilesize
1KB
MD59bf85d5bc917d2c0bbee15e48c6fec7a
SHA1b5e5b3e30be69e9d4b96071da494e7510686a4c3
SHA2564eb084452041b52cf65e005fad1bbe4ab6dc2fe135e624ebea868d55e044ab6b
SHA512180f235377656be3679e8b9245de2611c97d16427e69ddba15d9b0c452f13658e0b82fa7567391442f4222e6086fc7da7dddc203157feb06d90611cae839e084
-
memory/2372-22-0x0000000073FB0000-0x000000007469E000-memory.dmpFilesize
6.9MB
-
memory/2372-1-0x0000000000E40000-0x0000000000F16000-memory.dmpFilesize
856KB
-
memory/2372-2-0x0000000073FB0000-0x000000007469E000-memory.dmpFilesize
6.9MB
-
memory/2372-3-0x00000000003D0000-0x00000000003DA000-memory.dmpFilesize
40KB
-
memory/2372-4-0x0000000073FBE000-0x0000000073FBF000-memory.dmpFilesize
4KB
-
memory/2372-5-0x0000000073FB0000-0x000000007469E000-memory.dmpFilesize
6.9MB
-
memory/2372-6-0x0000000005580000-0x000000000561A000-memory.dmpFilesize
616KB
-
memory/2372-0-0x0000000073FBE000-0x0000000073FBF000-memory.dmpFilesize
4KB
-
memory/2620-17-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-21-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-20-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-15-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-14-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-13-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-12-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2620-16-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB