Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe
-
Size
289KB
-
MD5
375389bf695377358b96e03c5b091a6e
-
SHA1
c03751ce0025d329fc07c604d41cda77c03858b3
-
SHA256
2dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961
-
SHA512
4c34f930fa6cc6eca979fb0b1d94384398f21674a93164a76825eff2b1e8a249534c941177920d4ca81defa4fc130e897a958e472185341354293ac7416bd30f
-
SSDEEP
6144:IorVQm5p54eP17tCpOkqSEFO3R4kIG5/AH8MGT:lVQmtjP17tCpOMNh485/AcMGT
Malware Config
Extracted
systembc
mdadvertx17.xyz:4044
pkspacex19.xyz:4044
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2480 uslw.exe 2248 uslw.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\uslw.job 375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe File created C:\Windows\Tasks\uslw.job 375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1656 375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2480 2444 taskeng.exe 29 PID 2444 wrote to memory of 2480 2444 taskeng.exe 29 PID 2444 wrote to memory of 2480 2444 taskeng.exe 29 PID 2444 wrote to memory of 2480 2444 taskeng.exe 29 PID 2444 wrote to memory of 2248 2444 taskeng.exe 32 PID 2444 wrote to memory of 2248 2444 taskeng.exe 32 PID 2444 wrote to memory of 2248 2444 taskeng.exe 32 PID 2444 wrote to memory of 2248 2444 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\375389bf695377358b96e03c5b091a6e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
C:\Windows\system32\taskeng.exetaskeng.exe {E7F2E39D-F454-4BEE-AA4E-92D404199092} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\ProgramData\vngpxh\uslw.exeC:\ProgramData\vngpxh\uslw.exe start22⤵
- Executes dropped EXE
PID:2480
-
-
C:\ProgramData\vngpxh\uslw.exeC:\ProgramData\vngpxh\uslw.exe start22⤵
- Executes dropped EXE
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD5375389bf695377358b96e03c5b091a6e
SHA1c03751ce0025d329fc07c604d41cda77c03858b3
SHA2562dd3e669bd3b9727e7b744198c7ad0399a89c5e4287f8572fb9f19aaca93c961
SHA5124c34f930fa6cc6eca979fb0b1d94384398f21674a93164a76825eff2b1e8a249534c941177920d4ca81defa4fc130e897a958e472185341354293ac7416bd30f