Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
72cfa33b978294103889481feca472f2_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
72cfa33b978294103889481feca472f2_JaffaCakes118.exe
-
Size
222KB
-
MD5
72cfa33b978294103889481feca472f2
-
SHA1
0615eb31fd67345b9fa0d57d12a3bcb363152abe
-
SHA256
5d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a
-
SHA512
d1de5fee23b7a858ec62b849cd8a41cf896ab8b6df4836c65ba36942c1d1727b36832d45713a578c93e8a0b8650bf55923568637d91bb9b2196257a2ae015559
-
SSDEEP
3072:m04yjyyUD1HncBNyBNp5oEug4OkyJAQF1G8Xrrw+cC+lJDJEQkjvuMM:SR1HUUPCEZ4OkyJ9rrw+cZTuZSMM
Malware Config
Extracted
systembc
fanstat18.club:4044
dexblog90.club:4044
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3672 rnsapk.exe 3676 rnsapk.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 api.ipify.org 67 api.ipify.org -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\rnsapk.job 72cfa33b978294103889481feca472f2_JaffaCakes118.exe File created C:\Windows\Tasks\rnsapk.job 72cfa33b978294103889481feca472f2_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4040 1880 WerFault.exe 83 2344 3672 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72cfa33b978294103889481feca472f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnsapk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnsapk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1880 72cfa33b978294103889481feca472f2_JaffaCakes118.exe 1880 72cfa33b978294103889481feca472f2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72cfa33b978294103889481feca472f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72cfa33b978294103889481feca472f2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 9522⤵
- Program crash
PID:4040
-
-
C:\ProgramData\fxour\rnsapk.exeC:\ProgramData\fxour\rnsapk.exe start21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 4882⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1880 -ip 18801⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3672 -ip 36721⤵PID:2252
-
C:\ProgramData\fxour\rnsapk.exeC:\ProgramData\fxour\rnsapk.exe start21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD572cfa33b978294103889481feca472f2
SHA10615eb31fd67345b9fa0d57d12a3bcb363152abe
SHA2565d366decba2f9078f457cb35fe7bfd198760683a709f0d33745fc6e0ba59ac8a
SHA512d1de5fee23b7a858ec62b849cd8a41cf896ab8b6df4836c65ba36942c1d1727b36832d45713a578c93e8a0b8650bf55923568637d91bb9b2196257a2ae015559