Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe
-
Size
698.1MB
-
MD5
4ecaa168b95dd762fdcaea1b47b2a112
-
SHA1
962137afc085b16a55a44bbf6a3d62b2b3d6a6ee
-
SHA256
8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c
-
SHA512
445b456ee8456695c75ed46ac65f65d4fb91fae59f05f6d9ed6f98123300aa9a354d19299e17e0a58348db000a9860538066be8fc7ee316ec59dda4ff832d0a5
-
SSDEEP
49152:WbGala7PGeJAyPjmSE83wQ52Ah1aYIziFbJATz9RJv5gns6hjVDmivym:NaleMyBfHqzR6dVDmivym
Malware Config
Extracted
systembc
185.209.30.138:4127
192.168.1.149:4127
Signatures
-
Systembc family
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 Vik yefas das wam xox fogica migoqua quibi-gicek.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vik yefas das wam xox fogica migoqua quibi-gicek.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2648 cmd.exe 2608 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2608 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 2940 Vik yefas das wam xox fogica migoqua quibi-gicek.exe 2940 Vik yefas das wam xox fogica migoqua quibi-gicek.exe 2940 Vik yefas das wam xox fogica migoqua quibi-gicek.exe 2940 Vik yefas das wam xox fogica migoqua quibi-gicek.exe 2940 Vik yefas das wam xox fogica migoqua quibi-gicek.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2768 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 31 PID 2408 wrote to memory of 2768 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 31 PID 2408 wrote to memory of 2768 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 31 PID 2408 wrote to memory of 2768 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 31 PID 2408 wrote to memory of 2940 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 33 PID 2408 wrote to memory of 2940 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 33 PID 2408 wrote to memory of 2940 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 33 PID 2408 wrote to memory of 2940 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 33 PID 2408 wrote to memory of 2648 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 34 PID 2408 wrote to memory of 2648 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 34 PID 2408 wrote to memory of 2648 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 34 PID 2408 wrote to memory of 2648 2408 JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe 34 PID 2648 wrote to memory of 2036 2648 cmd.exe 36 PID 2648 wrote to memory of 2036 2648 cmd.exe 36 PID 2648 wrote to memory of 2036 2648 cmd.exe 36 PID 2648 wrote to memory of 2036 2648 cmd.exe 36 PID 2648 wrote to memory of 2608 2648 cmd.exe 37 PID 2648 wrote to memory of 2608 2648 cmd.exe 37 PID 2648 wrote to memory of 2608 2648 cmd.exe 37 PID 2648 wrote to memory of 2608 2648 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Jogeb pomok\Vik yefas das wam xox fogica migoqua quibi-gicek.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
C:\Users\Admin\Jogeb pomok\Vik yefas das wam xox fogica migoqua quibi-gicek.exe"C:\Users\Admin\Jogeb pomok\Vik yefas das wam xox fogica migoqua quibi-gicek.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b862b5b0e4fdb4d398055c790a8846089b53ee47ce605efd3198426e4edaf4c.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2608
-
-