Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe
-
Size
178KB
-
MD5
8a53ca14784db0d61dee57dbd1c38e54
-
SHA1
a60f41f04529432ae8e4577ba9f13bca904ab4e9
-
SHA256
d7588ed746eb3b1ef4b5ac9507d8e432174eba3b4638df6e1497ed45caecd045
-
SHA512
3947f8df002b02e7d5ee9df07d1fd93e7f8bf322d91f99a4069480498d61b3f42718790d7ec93100a29257339d1f9e2d61e0a98740b5a05fa5e994c280b868d8
-
SSDEEP
3072:M9GNDgwzRzLPTc6RyNRXBNssCCRc4fkxVsPHNw:ow1zLPY6RhCR/kQfq
Malware Config
Extracted
systembc
sdadvert197.com:4044
mexstat128.com:4044
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2576 eleunf.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org 8 ip4.seeip.org 9 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\eleunf.job 8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\eleunf.job 8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2912 8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2576 2036 taskeng.exe 29 PID 2036 wrote to memory of 2576 2036 taskeng.exe 29 PID 2036 wrote to memory of 2576 2036 taskeng.exe 29 PID 2036 wrote to memory of 2576 2036 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a53ca14784db0d61dee57dbd1c38e54_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
C:\Windows\system32\taskeng.exetaskeng.exe {4D507514-44A5-409E-A578-8C0D60AD61EC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\ProgramData\bsdle\eleunf.exeC:\ProgramData\bsdle\eleunf.exe start2⤵
- Executes dropped EXE
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD58a53ca14784db0d61dee57dbd1c38e54
SHA1a60f41f04529432ae8e4577ba9f13bca904ab4e9
SHA256d7588ed746eb3b1ef4b5ac9507d8e432174eba3b4638df6e1497ed45caecd045
SHA5123947f8df002b02e7d5ee9df07d1fd93e7f8bf322d91f99a4069480498d61b3f42718790d7ec93100a29257339d1f9e2d61e0a98740b5a05fa5e994c280b868d8