Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2024 17:32

General

  • Target

    55b4e7ffb50c61e3f44b6af2f360f8b6_JaffaCakes118.exe

  • Size

    236KB

  • MD5

    55b4e7ffb50c61e3f44b6af2f360f8b6

  • SHA1

    b0760a08794565ef5f03512ead50ec6ca2f0ca40

  • SHA256

    dba174d5ff22c6f4b3969a5dfd3dd66026a4f60d6ec73f5105c312f66ec2a6af

  • SHA512

    879fd56dcb0c74cb316e411474ea5e134ad819d19f0b1288941756fb47a6da9ce88ad3a5abac54ba86a0cab1de7fc41ffe05faa3e0f05623d8f5c74d18d7e2fd

  • SSDEEP

    3072:Y8AZJhoX+SWywcu/cSQsUwSz508dMW8dEONo3C5eeFJ1kgEb5VsPHgh:YZJeXNFpz5ri7W31eFJQbof+

Malware Config

Extracted

Family

systembc

C2

knock0909.monster:4035

knock0909.xyz:4035

Signatures

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55b4e7ffb50c61e3f44b6af2f360f8b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\55b4e7ffb50c61e3f44b6af2f360f8b6_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 480
      2⤵
      • Program crash
      PID:4664
  • C:\ProgramData\vmixt\nefpgh.exe
    C:\ProgramData\vmixt\nefpgh.exe start
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:3980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1388 -ip 1388
    1⤵
      PID:3916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\vmixt\nefpgh.exe

      Filesize

      236KB

      MD5

      55b4e7ffb50c61e3f44b6af2f360f8b6

      SHA1

      b0760a08794565ef5f03512ead50ec6ca2f0ca40

      SHA256

      dba174d5ff22c6f4b3969a5dfd3dd66026a4f60d6ec73f5105c312f66ec2a6af

      SHA512

      879fd56dcb0c74cb316e411474ea5e134ad819d19f0b1288941756fb47a6da9ce88ad3a5abac54ba86a0cab1de7fc41ffe05faa3e0f05623d8f5c74d18d7e2fd

    • memory/1388-2-0x00000000001C0000-0x00000000001C9000-memory.dmp

      Filesize

      36KB

    • memory/1388-1-0x0000000004F50000-0x0000000005050000-memory.dmp

      Filesize

      1024KB

    • memory/1388-3-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1388-4-0x0000000000400000-0x0000000004DDE000-memory.dmp

      Filesize

      73.9MB

    • memory/1388-15-0x00000000001C0000-0x00000000001C9000-memory.dmp

      Filesize

      36KB

    • memory/1388-14-0x0000000004F50000-0x0000000005050000-memory.dmp

      Filesize

      1024KB

    • memory/1388-16-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3980-12-0x0000000000400000-0x0000000004DDE000-memory.dmp

      Filesize

      73.9MB