Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
72cfa33b978294103889481feca472f2_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
72cfa33b978294103889481feca472f2_JaffaCakes118.exe
-
Size
222KB
-
MD5
72cfa33b978294103889481feca472f2
-
SHA1
0615eb31fd67345b9fa0d57d12a3bcb363152abe
-
SHA256
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a
-
SHA512
d1de5fee23b7a858ec62b849cd8a41cf896ab8b6df4836c65ba36942c1d1727b36832d45713a578c93e8a0b8650bf55923568637d91bb9b2196257a2ae015559
-
SSDEEP
3072:m04yjyyUD1HncBNyBNp5oEug4OkyJAQF1G8Xrrw+cC+lJDJEQkjvuMM:SR1HUUPCEZ4OkyJ9rrw+cZTuZSMM
Malware Config
Extracted
systembc
fanstat18.club:4044
dexblog90.club:4044
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2816 skhejs.exe 2012 skhejs.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skhejs.job 72cfa33b978294103889481feca472f2_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\skhejs.job 72cfa33b978294103889481feca472f2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72cfa33b978294103889481feca472f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skhejs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1584 72cfa33b978294103889481feca472f2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2816 2236 taskeng.exe 32 PID 2236 wrote to memory of 2816 2236 taskeng.exe 32 PID 2236 wrote to memory of 2816 2236 taskeng.exe 32 PID 2236 wrote to memory of 2816 2236 taskeng.exe 32 PID 2236 wrote to memory of 2012 2236 taskeng.exe 33 PID 2236 wrote to memory of 2012 2236 taskeng.exe 33 PID 2236 wrote to memory of 2012 2236 taskeng.exe 33 PID 2236 wrote to memory of 2012 2236 taskeng.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\72cfa33b978294103889481feca472f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72cfa33b978294103889481feca472f2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
C:\Windows\system32\taskeng.exetaskeng.exe {BDB4309F-F2F4-479E-AF9F-D668A82F7F60} S-1-5-21-1385883288-3042840365-2734249351-1000:RPXOCQRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\ProgramData\xbdqf\skhejs.exeC:\ProgramData\xbdqf\skhejs.exe start22⤵
- Executes dropped EXE
PID:2816
-
-
C:\ProgramData\xbdqf\skhejs.exeC:\ProgramData\xbdqf\skhejs.exe start22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD572cfa33b978294103889481feca472f2
SHA10615eb31fd67345b9fa0d57d12a3bcb363152abe
SHA2565d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a
SHA512d1de5fee23b7a858ec62b849cd8a41cf896ab8b6df4836c65ba36942c1d1727b36832d45713a578c93e8a0b8650bf55923568637d91bb9b2196257a2ae015559