Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
0dc61438b79668900bd081bac6109760_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
0dc61438b79668900bd081bac6109760_JaffaCakes118.exe
-
Size
350KB
-
MD5
0dc61438b79668900bd081bac6109760
-
SHA1
2ee66fd972c2d28ad30775971ba95056951910f0
-
SHA256
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd
-
SHA512
467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7
-
SSDEEP
6144:RoX0oZ+rm/OV6ZH7XYuB4xpuMadbr2X3f+gOkXdhFr:Ry0xrm/h7XYuWCMaV2XWgO8hFr
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2192 cgajd.exe 2848 cgajd.exe 2964 cgajd.exe 2904 cgajd.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2044 set thread context of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2192 set thread context of 2848 2192 cgajd.exe 32 PID 2964 set thread context of 2904 2964 cgajd.exe 34 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\cgajd.job 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\cgajd.job 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgajd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgajd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgajd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2520 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2520 2044 0dc61438b79668900bd081bac6109760_JaffaCakes118.exe 29 PID 2160 wrote to memory of 2192 2160 taskeng.exe 31 PID 2160 wrote to memory of 2192 2160 taskeng.exe 31 PID 2160 wrote to memory of 2192 2160 taskeng.exe 31 PID 2160 wrote to memory of 2192 2160 taskeng.exe 31 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2192 wrote to memory of 2848 2192 cgajd.exe 32 PID 2160 wrote to memory of 2964 2160 taskeng.exe 33 PID 2160 wrote to memory of 2964 2160 taskeng.exe 33 PID 2160 wrote to memory of 2964 2160 taskeng.exe 33 PID 2160 wrote to memory of 2964 2160 taskeng.exe 33 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34 PID 2964 wrote to memory of 2904 2964 cgajd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dc61438b79668900bd081bac6109760_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0dc61438b79668900bd081bac6109760_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\0dc61438b79668900bd081bac6109760_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0dc61438b79668900bd081bac6109760_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0A71B06E-BB95-465D-8E2F-AC58E61B0572} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\ProgramData\nkvj\cgajd.exeC:\ProgramData\nkvj\cgajd.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\ProgramData\nkvj\cgajd.exeC:\ProgramData\nkvj\cgajd.exe start3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\ProgramData\nkvj\cgajd.exeC:\ProgramData\nkvj\cgajd.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\ProgramData\nkvj\cgajd.exeC:\ProgramData\nkvj\cgajd.exe start3⤵
- Executes dropped EXE
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD50dc61438b79668900bd081bac6109760
SHA12ee66fd972c2d28ad30775971ba95056951910f0
SHA256318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd
SHA512467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7