Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
a2d724e306338577a5896594950d41a5_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a2d724e306338577a5896594950d41a5_JaffaCakes118.exe
-
Size
335KB
-
MD5
a2d724e306338577a5896594950d41a5
-
SHA1
7914ac4f3911cd4ea2aa15546a6f14cabe89b55d
-
SHA256
8ceee34b010701c3745db2e9868c68902440d951d7c2dbe383ee2c25d5aa20dc
-
SHA512
af91fbca78e583ff5a9cc211b154fb5043918fde3d8b0e93e22d9b08e0d0e05ce03bb8e7b7c62a1ac07e2d7b85332badedd03bd681c05dfb0de6e79e2c616526
-
SSDEEP
6144:rUpXdMEe7VdlxQ/0C7WBCgs0Wkadbr2X3f+gOkXdhF3:rUddkjlk1WBz0kaV2XWgO8hF3
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ltmffpi.exepid process 2636 ltmffpi.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
Processes:
a2d724e306338577a5896594950d41a5_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\Tasks\ltmffpi.job a2d724e306338577a5896594950d41a5_JaffaCakes118.exe File created C:\Windows\Tasks\ltmffpi.job a2d724e306338577a5896594950d41a5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a2d724e306338577a5896594950d41a5_JaffaCakes118.exeltmffpi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2d724e306338577a5896594950d41a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltmffpi.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a2d724e306338577a5896594950d41a5_JaffaCakes118.exepid process 784 a2d724e306338577a5896594950d41a5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1920 wrote to memory of 2636 1920 taskeng.exe ltmffpi.exe PID 1920 wrote to memory of 2636 1920 taskeng.exe ltmffpi.exe PID 1920 wrote to memory of 2636 1920 taskeng.exe ltmffpi.exe PID 1920 wrote to memory of 2636 1920 taskeng.exe ltmffpi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d724e306338577a5896594950d41a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2d724e306338577a5896594950d41a5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:784
-
C:\Windows\system32\taskeng.exetaskeng.exe {BB95505D-D8C9-4C00-B75E-EFB060FC755C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\ProgramData\qrkclun\ltmffpi.exeC:\ProgramData\qrkclun\ltmffpi.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD5a2d724e306338577a5896594950d41a5
SHA17914ac4f3911cd4ea2aa15546a6f14cabe89b55d
SHA2568ceee34b010701c3745db2e9868c68902440d951d7c2dbe383ee2c25d5aa20dc
SHA512af91fbca78e583ff5a9cc211b154fb5043918fde3d8b0e93e22d9b08e0d0e05ce03bb8e7b7c62a1ac07e2d7b85332badedd03bd681c05dfb0de6e79e2c616526