Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 12:06
Behavioral task
behavioral1
Sample
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe
-
Size
560KB
-
MD5
f85699f0c3bca198228a5af7de67ecba
-
SHA1
56f4a24a398dae4e6e47d62832144673b3486f9f
-
SHA256
4c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
-
SHA512
b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582
-
SSDEEP
6144:Qo18eOaj6RFu8Ogc+ICwVDhvrb1JA2vbyWg3Ti9ptZdACz+0hRFQDOcYd/auoFn4:Qaj6XO1X1fTnTjOuRFQGSPI5eLX+
Malware Config
Extracted
kutaki
http://maregatu.club/paapoo/pove.php
http://terebinnahi.club/sec/kool.txt
Signatures
-
Kutaki Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gumxymch.exe family_kutaki -
Drops startup file 2 IoCs
Processes:
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gumxymch.exe f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gumxymch.exe f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
gumxymch.exepid process 2420 gumxymch.exe -
Loads dropped DLL 2 IoCs
Processes:
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exepid process 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
gumxymch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum gumxymch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 gumxymch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exegumxymch.exeDllHost.exef85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gumxymch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2944 DllHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exegumxymch.exepid process 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe 2420 gumxymch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exedescription pid process target process PID 1544 wrote to memory of 2680 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe cmd.exe PID 1544 wrote to memory of 2680 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe cmd.exe PID 1544 wrote to memory of 2680 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe cmd.exe PID 1544 wrote to memory of 2680 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe cmd.exe PID 1544 wrote to memory of 2420 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe gumxymch.exe PID 1544 wrote to memory of 2420 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe gumxymch.exe PID 1544 wrote to memory of 2420 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe gumxymch.exe PID 1544 wrote to memory of 2420 1544 f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe gumxymch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f85699f0c3bca198228a5af7de67ecba_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gumxymch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gumxymch.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
560KB
MD5f85699f0c3bca198228a5af7de67ecba
SHA156f4a24a398dae4e6e47d62832144673b3486f9f
SHA2564c1bc4e929ba5c02a4fbba9b7bb3eb728a3f4e010e04a9c10189487c1843085e
SHA512b170c937b015ae6a2ae98ae609f2c6626130681b95d45089d99d9bed9b8fffc54b170b1f69d0d2b64acbf8d3282e08e45b5accbdbbc753dbaa13d6ff510e3582