Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe
-
Size
795.6MB
-
MD5
490cef9b9ed2ff8aafa7ddd3d11d4160
-
SHA1
8a9592214c2486df6c6074a71c01f29e2572caf1
-
SHA256
d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd
-
SHA512
8eb4b718a9affb488d8974ceab892b79642fff33d3044feb0cdb7e28e3fdc7e90538d3342a2e853974cf97c3b15a72f4c81f00691e2e2a1c01ff1b714d04a4f0
-
SSDEEP
49152:ocyNPK4Y1UJLBfIjNC3OIFjtSuiQpVKBuW:Mi/1UDfv317KBuW
Malware Config
Extracted
systembc
45.81.225.72:4001
192.168.1.149:4001
Signatures
-
Systembc family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 rocini mebeyabo noxone.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2416 set thread context of 4840 2416 rocini mebeyabo noxone.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rocini mebeyabo noxone.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1064 cmd.exe 4968 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4968 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe 2416 rocini mebeyabo noxone.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2788 wrote to memory of 1080 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 99 PID 2788 wrote to memory of 1080 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 99 PID 2788 wrote to memory of 1080 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 99 PID 2788 wrote to memory of 2416 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 101 PID 2788 wrote to memory of 2416 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 101 PID 2788 wrote to memory of 2416 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 101 PID 2788 wrote to memory of 1064 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 102 PID 2788 wrote to memory of 1064 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 102 PID 2788 wrote to memory of 1064 2788 JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe 102 PID 1064 wrote to memory of 1116 1064 cmd.exe 104 PID 1064 wrote to memory of 1116 1064 cmd.exe 104 PID 1064 wrote to memory of 1116 1064 cmd.exe 104 PID 1064 wrote to memory of 4968 1064 cmd.exe 105 PID 1064 wrote to memory of 4968 1064 cmd.exe 105 PID 1064 wrote to memory of 4968 1064 cmd.exe 105 PID 2416 wrote to memory of 4840 2416 rocini mebeyabo noxone.exe 107 PID 2416 wrote to memory of 4840 2416 rocini mebeyabo noxone.exe 107 PID 2416 wrote to memory of 4840 2416 rocini mebeyabo noxone.exe 107 PID 2416 wrote to memory of 4840 2416 rocini mebeyabo noxone.exe 107 PID 2416 wrote to memory of 4840 2416 rocini mebeyabo noxone.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Makip pake racotef pewina ligiya pofol kadoquif yerotel mad reyeg hexiyino\rocini mebeyabo noxone.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1080
-
-
C:\Users\Admin\Makip pake racotef pewina ligiya pofol kadoquif yerotel mad reyeg hexiyino\rocini mebeyabo noxone.exe"C:\Users\Admin\Makip pake racotef pewina ligiya pofol kadoquif yerotel mad reyeg hexiyino\rocini mebeyabo noxone.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d44096417899cb12d0fe2db404a01bb3294d309dda9e7487cbaa0699c3b457fd.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4968
-
-