Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe
-
Size
90KB
-
MD5
92dbe3d237c0b38a6feaece08bf7a1f6
-
SHA1
5eeda1c31858de743f8afa7ce6c24c8c0e816c7d
-
SHA256
67713ae5aac48a69c97bcb8dbc6db59518a3b7c60ce57ab48c1883bd995bf7d4
-
SHA512
fe5f35f485dc2a675374c2581ea8a0bb92f88ef43d225e0f53d57bed6587fd73a8554cd946af252f1557e3e8573c00c43929c31e9e32258aae2b49e538c6494d
-
SSDEEP
1536:YyXUR8CPCrDfDpmk5C7hWmMv1CoAuBFYDlXq6RTm:5XUta7ptgC1CCE66R
Malware Config
Extracted
systembc
sdadvert197.com:4044
mexstat128.com:4044
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uintbf.exepid process 2876 uintbf.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip4.seeip.org 9 ip4.seeip.org 6 api.ipify.org 7 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exedescription ioc process File created C:\Windows\Tasks\uintbf.job 92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\uintbf.job 92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exepid process 2064 92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 3048 wrote to memory of 2876 3048 taskeng.exe uintbf.exe PID 3048 wrote to memory of 2876 3048 taskeng.exe uintbf.exe PID 3048 wrote to memory of 2876 3048 taskeng.exe uintbf.exe PID 3048 wrote to memory of 2876 3048 taskeng.exe uintbf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\92dbe3d237c0b38a6feaece08bf7a1f6_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
C:\Windows\system32\taskeng.exetaskeng.exe {CF44ACB2-31C8-45FE-9958-6D3FF5B008B2} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\ProgramData\dgjl\uintbf.exeC:\ProgramData\dgjl\uintbf.exe start2⤵
- Executes dropped EXE
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD592dbe3d237c0b38a6feaece08bf7a1f6
SHA15eeda1c31858de743f8afa7ce6c24c8c0e816c7d
SHA25667713ae5aac48a69c97bcb8dbc6db59518a3b7c60ce57ab48c1883bd995bf7d4
SHA512fe5f35f485dc2a675374c2581ea8a0bb92f88ef43d225e0f53d57bed6587fd73a8554cd946af252f1557e3e8573c00c43929c31e9e32258aae2b49e538c6494d