Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 08:06
Behavioral task
behavioral1
Sample
dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe
-
Size
209KB
-
MD5
dfcabb4fe83a48168317bb52644582af
-
SHA1
b75212a72147b16ab2a4c6057bdb4c034bc0533d
-
SHA256
374dfac7378794f1b4a2b8595944fdff10d5a6cb14b0053c756ad4ca43184518
-
SHA512
936e08e7068f75239713523f8300c5ad1fe231a8ea234404169aa91a37cc4aaf04f85bf65a34a86120bd73e6021868b1cd8ec46e5a101a9d149950fa6d0872e4
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U4:cnLh9yn52rpUR5vHuRYpM+4
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2920 gfcwu.exe -
resource yara_rule behavioral1/memory/2096-1-0x0000000000400000-0x00000000045F0000-memory.dmp upx behavioral1/files/0x0008000000016c62-9.dat upx -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\gfcwu.job dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe File created C:\Windows\Tasks\gfcwu.job dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gfcwu.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2096 dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2920 2528 taskeng.exe 31 PID 2528 wrote to memory of 2920 2528 taskeng.exe 31 PID 2528 wrote to memory of 2920 2528 taskeng.exe 31 PID 2528 wrote to memory of 2920 2528 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
C:\Windows\system32\taskeng.exetaskeng.exe {DE65164B-6452-4DF4-8576-A93181BBCED8} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\ProgramData\kmkbnb\gfcwu.exeC:\ProgramData\kmkbnb\gfcwu.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5dfcabb4fe83a48168317bb52644582af
SHA1b75212a72147b16ab2a4c6057bdb4c034bc0533d
SHA256374dfac7378794f1b4a2b8595944fdff10d5a6cb14b0053c756ad4ca43184518
SHA512936e08e7068f75239713523f8300c5ad1fe231a8ea234404169aa91a37cc4aaf04f85bf65a34a86120bd73e6021868b1cd8ec46e5a101a9d149950fa6d0872e4