Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe
-
Size
795.6MB
-
MD5
490cef9b9ed2ff8aafa7ddd3d11d4160
-
SHA1
8a9592214c2486df6c6074a71c01f29e2572caf1
-
SHA256
d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd
-
SHA512
8eb4b718a9affb488d8974ceab892b79642fff33d3044feb0cdb7e28e3fdc7e90538d3342a2e853974cf97c3b15a72f4c81f00691e2e2a1c01ff1b714d04a4f0
-
SSDEEP
49152:ocyNPK4Y1UJLBfIjNC3OIFjtSuiQpVKBuW:Mi/1UDfv317KBuW
Malware Config
Extracted
systembc
45.81.225.72:4001
192.168.1.149:4001
Signatures
-
Systembc family
-
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 rocini mebeyabo noxone.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 1540 2720 rocini mebeyabo noxone.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rocini mebeyabo noxone.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2560 cmd.exe 2996 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2996 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2720 rocini mebeyabo noxone.exe 2720 rocini mebeyabo noxone.exe 2720 rocini mebeyabo noxone.exe 2720 rocini mebeyabo noxone.exe 2720 rocini mebeyabo noxone.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2844 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 31 PID 2084 wrote to memory of 2844 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 31 PID 2084 wrote to memory of 2844 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 31 PID 2084 wrote to memory of 2844 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 31 PID 2084 wrote to memory of 2720 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 33 PID 2084 wrote to memory of 2720 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 33 PID 2084 wrote to memory of 2720 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 33 PID 2084 wrote to memory of 2720 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 33 PID 2084 wrote to memory of 2560 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 34 PID 2084 wrote to memory of 2560 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 34 PID 2084 wrote to memory of 2560 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 34 PID 2084 wrote to memory of 2560 2084 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 34 PID 2560 wrote to memory of 2032 2560 cmd.exe 36 PID 2560 wrote to memory of 2032 2560 cmd.exe 36 PID 2560 wrote to memory of 2032 2560 cmd.exe 36 PID 2560 wrote to memory of 2032 2560 cmd.exe 36 PID 2560 wrote to memory of 2996 2560 cmd.exe 37 PID 2560 wrote to memory of 2996 2560 cmd.exe 37 PID 2560 wrote to memory of 2996 2560 cmd.exe 37 PID 2560 wrote to memory of 2996 2560 cmd.exe 37 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38 PID 2720 wrote to memory of 1540 2720 rocini mebeyabo noxone.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Makip pake racotef pewina ligiya pofol kadoquif yerotel mad reyeg hexiyino\rocini mebeyabo noxone.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Users\Admin\Makip pake racotef pewina ligiya pofol kadoquif yerotel mad reyeg hexiyino\rocini mebeyabo noxone.exe"C:\Users\Admin\Makip pake racotef pewina ligiya pofol kadoquif yerotel mad reyeg hexiyino\rocini mebeyabo noxone.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2996
-
-