Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
53a9319f71e5c132dc2ec045908f627d
-
SHA1
a5a3904a9e99bb8a1d637a4d60163ebedcc85ffc
-
SHA256
821f5310b1730641b6578ac9ce0173802db407192afdb30039f941df1ff8f1c2
-
SHA512
8f26e1ac756f4c67db83228b7a9647b7edd3d9614a45829e1a413603758e5272dca861af616397be2b737085c694d88ad729dc7ab3f512c138f70d15ee36e30f
-
SSDEEP
24576:iUzD931mlZz47ls/tHwva9dJ5rUb7Yzx6ZxBUOX4bCN32fGcekEJcy4fnvNbtfdw:imDrmDbNQZFobAKhjZ9bXE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1280 cmd.exe 4568 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 api.ipify.org 59 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svm.job cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4264 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 4264 ipconfig.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe 1280 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4264 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1280 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83 PID 4524 wrote to memory of 4264 4524 53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53a9319f71e5c132dc2ec045908f627d_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:4568
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
28B
MD5f4a45e88f35bef4dac1ae3dccba6ada3
SHA14766d665952681af8058024d031bedc9e72d7009
SHA256d6f576774fc0971cae3c15bc1ed72dba932387d35773aa3f973072eb924714e0
SHA5129a0f8513e9adea4ff65606b307813e47cbb36caedb4c03a2ea9e7e36683e0ce2ae9a1c337873be7f648077dc05cb459ca804fa013764cd22627c9a4bedd73a2e