Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe
-
Size
168KB
-
MD5
3a1fd8df0d5c55c3a72c86819f6a0679
-
SHA1
1ee6d5be78509a0ccaf7194d9eee36f12d6e8ea4
-
SHA256
fe9c809037f44ae90bb094ab94481e3cfc42d286ce90eb1e4e19e44268537424
-
SHA512
5d4e7eef1a4e5c3f498d4e24dc53566b8357d0e7b05eeef01449f8a9be2eed72822dfcd9190a3b1d90056522cbc5a1961e5e5f039e6ff19cc62fb9d97c5e7e0b
-
SSDEEP
3072:F6N7CSt27vt+Ma/lDphLMzPpoVVqQ2rMo/XTpQXpfWXk:07CD/CNh4zCVN2rMWjesX
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 xfmqcx.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\xfmqcx.job 3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\xfmqcx.job 3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfmqcx.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2020 3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2736 2660 taskeng.exe 31 PID 2660 wrote to memory of 2736 2660 taskeng.exe 31 PID 2660 wrote to memory of 2736 2660 taskeng.exe 31 PID 2660 wrote to memory of 2736 2660 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a1fd8df0d5c55c3a72c86819f6a0679_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
C:\Windows\system32\taskeng.exetaskeng.exe {7FB4EE53-0216-43D4-8999-94D3CCC3118A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\ProgramData\sksc\xfmqcx.exeC:\ProgramData\sksc\xfmqcx.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53a1fd8df0d5c55c3a72c86819f6a0679
SHA11ee6d5be78509a0ccaf7194d9eee36f12d6e8ea4
SHA256fe9c809037f44ae90bb094ab94481e3cfc42d286ce90eb1e4e19e44268537424
SHA5125d4e7eef1a4e5c3f498d4e24dc53566b8357d0e7b05eeef01449f8a9be2eed72822dfcd9190a3b1d90056522cbc5a1961e5e5f039e6ff19cc62fb9d97c5e7e0b