Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
273c816d57bb09b14ff288111decf989_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
273c816d57bb09b14ff288111decf989_JaffaCakes118.exe
-
Size
237KB
-
MD5
273c816d57bb09b14ff288111decf989
-
SHA1
25dd5c1b710b794c0ad4d6a3f7dd17d3a01f28cd
-
SHA256
142a2de7157729abf8612c21e0adf05cc33e9b6d479b364e2e1d4073b89c110e
-
SHA512
99d69e94f27577278a2eb79f1bd9fceb25352eef64a4bb09433520491cde430aff2d842214cba34901ae36a93f710e8a6884f16881a7bc88ac0184b767fb167a
-
SSDEEP
3072:CAscqYX+PWywvu/cMQkCSeXIyZjcW1EOT8TpRg5oXlvDszMVsPHgh:ecfX4EHX7ZhiRVXBaf+
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sbluh.exepid Process 384 sbluh.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 43 api.ipify.org 44 api.ipify.org -
Drops file in Windows directory 2 IoCs
Processes:
273c816d57bb09b14ff288111decf989_JaffaCakes118.exedescription ioc Process File created C:\Windows\Tasks\sbluh.job 273c816d57bb09b14ff288111decf989_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\sbluh.job 273c816d57bb09b14ff288111decf989_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1792 4704 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
273c816d57bb09b14ff288111decf989_JaffaCakes118.exesbluh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 273c816d57bb09b14ff288111decf989_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sbluh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
273c816d57bb09b14ff288111decf989_JaffaCakes118.exepid Process 4704 273c816d57bb09b14ff288111decf989_JaffaCakes118.exe 4704 273c816d57bb09b14ff288111decf989_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\273c816d57bb09b14ff288111decf989_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\273c816d57bb09b14ff288111decf989_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9402⤵
- Program crash
PID:1792
-
-
C:\ProgramData\afinhqt\sbluh.exeC:\ProgramData\afinhqt\sbluh.exe start1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4704 -ip 47041⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5273c816d57bb09b14ff288111decf989
SHA125dd5c1b710b794c0ad4d6a3f7dd17d3a01f28cd
SHA256142a2de7157729abf8612c21e0adf05cc33e9b6d479b364e2e1d4073b89c110e
SHA51299d69e94f27577278a2eb79f1bd9fceb25352eef64a4bb09433520491cde430aff2d842214cba34901ae36a93f710e8a6884f16881a7bc88ac0184b767fb167a