Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe
-
Size
345KB
-
MD5
bb0a1a5209fd48e63807b1ba15d6bb69
-
SHA1
d3170be1c5ae8e2a24cad223c63f382bd796ceb1
-
SHA256
e86c00bb96428b8c113169da2c996f457ed22467c5ad998e87bb48b65e98ab36
-
SHA512
d238e9ddece294a5e6edff0fdb372a0433a3bf6f3f64015ac673149a7f59bc3233c1c0874fe5f1387d7a385a52d031e2253e86e58b3384c59f7689d8ac7ea4fd
-
SSDEEP
6144:aQ6Xl1NFXVdTUMJwA9yLbTMhdbr2X3f+gOkXdhFr:aQwlV8A9yL/iV2XWgO8hFr
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 kndqrhv.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 88.198.207.48 -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 ip4.seeip.org 5 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\kndqrhv.job bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\kndqrhv.job bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kndqrhv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2696 2900 taskeng.exe 32 PID 2900 wrote to memory of 2696 2900 taskeng.exe 32 PID 2900 wrote to memory of 2696 2900 taskeng.exe 32 PID 2900 wrote to memory of 2696 2900 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb0a1a5209fd48e63807b1ba15d6bb69_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
C:\Windows\system32\taskeng.exetaskeng.exe {A7A14909-8661-4FDC-A56B-4686459CD812} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\ProgramData\hthb\kndqrhv.exeC:\ProgramData\hthb\kndqrhv.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD5bb0a1a5209fd48e63807b1ba15d6bb69
SHA1d3170be1c5ae8e2a24cad223c63f382bd796ceb1
SHA256e86c00bb96428b8c113169da2c996f457ed22467c5ad998e87bb48b65e98ab36
SHA512d238e9ddece294a5e6edff0fdb372a0433a3bf6f3f64015ac673149a7f59bc3233c1c0874fe5f1387d7a385a52d031e2253e86e58b3384c59f7689d8ac7ea4fd