Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe
-
Size
168KB
-
MD5
4c94136171542215949f50f67e5f34f2
-
SHA1
101a5a5afe5b902af9050bef2d2ddd5e54f54448
-
SHA256
2becd96e38316309a80434b66df8a932bf57f70c66118860d9510758c281e06f
-
SHA512
7fabc5cad68035586766e7e8243d232fcbdcb5b18dee2c303c23797d8f439047031c11b875121e19023115a76b66939d11e6366a64e5037bfc64ec011cf57782
-
SSDEEP
3072:JfN7Cjt27vt+Ma/ljphLMzBiKjILzyMatMZ2XefeN:T7CK/Cth4znszXaPHN
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2772 sjvfuq.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\sjvfuq.job 4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe File created C:\Windows\Tasks\sjvfuq.job 4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjvfuq.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2084 4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2772 2164 taskeng.exe 31 PID 2164 wrote to memory of 2772 2164 taskeng.exe 31 PID 2164 wrote to memory of 2772 2164 taskeng.exe 31 PID 2164 wrote to memory of 2772 2164 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c94136171542215949f50f67e5f34f2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
C:\Windows\system32\taskeng.exetaskeng.exe {CB9068F7-08F8-4B34-8FDA-E520A1FF2615} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\ProgramData\mdsu\sjvfuq.exeC:\ProgramData\mdsu\sjvfuq.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54c94136171542215949f50f67e5f34f2
SHA1101a5a5afe5b902af9050bef2d2ddd5e54f54448
SHA2562becd96e38316309a80434b66df8a932bf57f70c66118860d9510758c281e06f
SHA5127fabc5cad68035586766e7e8243d232fcbdcb5b18dee2c303c23797d8f439047031c11b875121e19023115a76b66939d11e6366a64e5037bfc64ec011cf57782