Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe
-
Size
168KB
-
MD5
88b7218e0e2ce38dcbb6647aebc1b915
-
SHA1
84359a09ba1025ef5e17521a098aa1a5b27300df
-
SHA256
c08ae3fc4f7db6848f829eb7548530e2522ee3eb60a57b2c38cd1bdc862f5d6f
-
SHA512
1976d16421d6085d9588c62712ea31b7bc31abb1f7bf8cae238b700fd5932d0f0aa46675e824201e5a292811c5bd6fe0e91d7b62d39b85e566a45d814255dd66
-
SSDEEP
3072:GlN7OGtM7vN+Ma/lkphLMzirj6gvzH2Hd81VrX2fMZ:k7OhfCGh4zw1vDE2nB
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2184 dshtva.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\dshtva.job 88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\dshtva.job 88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dshtva.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2244 88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2184 1764 taskeng.exe 31 PID 1764 wrote to memory of 2184 1764 taskeng.exe 31 PID 1764 wrote to memory of 2184 1764 taskeng.exe 31 PID 1764 wrote to memory of 2184 1764 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88b7218e0e2ce38dcbb6647aebc1b915_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
C:\Windows\system32\taskeng.exetaskeng.exe {F02ACB13-8518-42AB-AF14-F030B5D87D92} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\ProgramData\joub\dshtva.exeC:\ProgramData\joub\dshtva.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD588b7218e0e2ce38dcbb6647aebc1b915
SHA184359a09ba1025ef5e17521a098aa1a5b27300df
SHA256c08ae3fc4f7db6848f829eb7548530e2522ee3eb60a57b2c38cd1bdc862f5d6f
SHA5121976d16421d6085d9588c62712ea31b7bc31abb1f7bf8cae238b700fd5932d0f0aa46675e824201e5a292811c5bd6fe0e91d7b62d39b85e566a45d814255dd66