Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe
-
Size
5.8MB
-
MD5
f10a4d3469a3cfb8ef469d14bbbd3034
-
SHA1
f80c017a0eaba637b78ee472723e5f27aebb2c79
-
SHA256
8a5776f0dc1869efa02e2842c52fc645456050aaf981e520fcb768cb2f039c2f
-
SHA512
68072332a0fb31b2149561a418f9a172de034dafbdf9d8d64eab79010845460bf98ed0573e014b6e50bae3a76e49590700e158b05e3ab6d875000a31a5591985
-
SSDEEP
12288:mh3Hz9Hez0l7jmUCVgYrGCBB6R0EwLtWwe2:YHJvl+6YT36R0EwLIwe2
Malware Config
Extracted
qakbot
325.43
abc004
1600335944
47.146.169.85:443
74.75.216.202:443
173.22.125.129:2222
200.75.136.78:443
65.131.34.101:995
84.78.128.76:2222
24.53.49.240:2222
72.209.191.27:443
189.183.73.227:995
178.222.113.168:995
71.221.92.98:443
37.210.186.213:61201
92.59.35.196:2222
98.26.50.62:995
5.81.250.6:2222
72.204.242.138:20
207.255.161.8:443
207.255.161.8:2087
207.255.161.8:32103
203.198.96.200:443
72.204.242.138:53
80.240.26.178:443
24.201.79.208:2078
24.234.86.201:995
172.78.30.215:443
65.30.213.13:6882
2.90.109.29:995
81.133.234.36:2222
51.223.158.125:443
134.0.196.46:995
93.113.177.152:443
190.85.91.154:443
178.80.58.18:443
103.76.160.110:443
67.60.113.253:2222
75.87.161.32:995
72.186.1.237:443
207.237.1.152:443
74.56.167.31:443
72.28.255.159:995
77.27.174.49:995
107.77.237.118:0
188.25.244.220:443
66.222.88.126:995
47.146.32.175:443
72.82.15.220:443
166.62.180.194:2078
5.193.181.221:2078
117.218.208.239:443
39.36.105.140:995
96.237.141.134:995
216.201.162.158:443
209.182.122.217:443
148.75.231.53:443
77.159.149.74:443
72.66.47.70:443
70.124.29.226:443
85.186.233.237:443
203.106.195.67:443
108.185.113.12:443
216.163.4.136:443
66.215.32.224:443
35.134.202.234:443
72.204.242.138:32102
207.255.161.8:465
103.206.112.234:443
83.110.6.64:2222
96.41.93.96:443
186.94.5.67:2078
79.114.189.38:443
47.138.201.136:443
96.247.177.63:443
71.126.139.251:443
71.84.5.114:995
95.77.223.148:443
108.178.66.82:995
134.228.24.29:443
76.170.77.99:995
86.98.89.62:2222
184.98.103.204:995
151.234.65.228:995
45.32.155.12:443
75.136.40.155:443
175.211.225.118:443
98.22.65.76:443
68.174.9.179:443
61.1.216.185:443
50.244.112.10:995
67.165.206.193:993
72.204.242.138:465
69.11.247.242:443
75.81.25.223:443
50.232.172.114:443
184.180.157.203:2222
2.7.65.32:2222
96.227.127.13:443
50.29.166.232:995
96.18.240.158:443
79.118.122.190:2222
184.97.148.2:443
207.255.161.8:993
69.167.206.238:50001
72.36.59.46:2222
173.26.189.151:443
217.162.149.212:443
176.223.82.244:995
36.77.151.211:443
156.213.179.139:443
213.31.203.48:2222
71.187.170.235:443
46.53.17.64:443
68.174.15.223:443
151.73.119.40:443
207.255.161.8:32100
207.255.161.8:2078
199.247.22.145:443
78.96.199.79:443
24.27.82.216:2222
109.154.214.224:2222
59.26.204.144:443
188.51.33.232:995
73.228.1.246:443
50.244.112.106:443
24.37.178.158:443
47.28.131.209:443
207.255.161.8:995
141.158.47.123:443
72.204.242.138:990
41.230.208.230:443
50.104.68.223:443
61.3.189.189:443
98.16.204.189:995
2.90.44.121:995
71.12.214.209:2222
189.231.196.236:443
2.91.73.105:995
67.209.195.198:443
80.14.209.42:2222
94.52.68.72:443
207.246.75.201:443
45.77.193.83:443
45.32.154.10:443
209.137.209.163:995
89.42.142.35:443
80.195.103.146:2222
72.190.101.70:443
67.170.137.8:443
185.246.9.69:995
71.88.104.107:443
76.111.128.194:443
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exef10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.execmd.exePING.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2592 cmd.exe 2876 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exef10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exepid process 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe 2724 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe 2724 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.execmd.exedescription pid process target process PID 2968 wrote to memory of 2724 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe PID 2968 wrote to memory of 2724 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe PID 2968 wrote to memory of 2724 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe PID 2968 wrote to memory of 2724 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe PID 2968 wrote to memory of 2592 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe cmd.exe PID 2968 wrote to memory of 2592 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe cmd.exe PID 2968 wrote to memory of 2592 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe cmd.exe PID 2968 wrote to memory of 2592 2968 f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe cmd.exe PID 2592 wrote to memory of 2876 2592 cmd.exe PING.EXE PID 2592 wrote to memory of 2876 2592 cmd.exe PING.EXE PID 2592 wrote to memory of 2876 2592 cmd.exe PING.EXE PID 2592 wrote to memory of 2876 2592 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe /C2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\f10a4d3469a3cfb8ef469d14bbbd3034_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2876
-
-