Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/05/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
53a9319f71e5c132dc2ec045908f627d
-
SHA1
a5a3904a9e99bb8a1d637a4d60163ebedcc85ffc
-
SHA256
821f5310b1730641b6578ac9ce0173802db407192afdb30039f941df1ff8f1c2
-
SHA512
8f26e1ac756f4c67db83228b7a9647b7edd3d9614a45829e1a413603758e5272dca861af616397be2b737085c694d88ad729dc7ab3f512c138f70d15ee36e30f
-
SSDEEP
24576:iUzD931mlZz47ls/tHwva9dJ5rUb7Yzx6ZxBUOX4bCN32fGcekEJcy4fnvNbtfdw:imDrmDbNQZFobAKhjZ9bXE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3024 cmd.exe 2308 GetX64BTIT.exe -
Loads dropped DLL 2 IoCs
pid Process 1796 ipconfig.exe 3024 cmd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svm.job cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1796 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 1796 ipconfig.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe 3024 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1796 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 3000 wrote to memory of 1796 3000 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 28 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32 PID 1796 wrote to memory of 3024 1796 ipconfig.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Loads dropped DLL
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:2308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5deab6d3492dac457dd674c1a9347cec3
SHA1a8de2997ed83d24adcd0eb90a4dc15d2ec1ab665
SHA256770fde968152c799d75bd045ebfa94bf61500450dc3f7f556bdc3a1941f284b4
SHA512a9174039d7c8404329933cf37f1d0dfab7bbc66f3d0fb370a5aa815fa25aa091c6958d73df4276b47a14ec4879da68b34d9aef88c49c0522dd9fe663a1d22f13
-
Filesize
295KB
MD5ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1