Analysis
-
max time kernel
142s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 20:52
Behavioral task
behavioral1
Sample
JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe
-
Size
212KB
-
MD5
3645d634e5976620737eaffe304d30a7
-
SHA1
6b8f47c29a2710a5dee91f61095b71cd3bb65660
-
SHA256
046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701
-
SHA512
00014b0a0c892718ea66630137639305da6294636598a90dcafcb7d71869bcd5912c8ee531d9265682321859da8ce4466da8a41347ecab069f182b4ae421862d
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U:cnLh9yn52rpUR5vHuRYpM+
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Signatures
-
Systembc family
-
Executes dropped EXE 1 IoCs
pid Process 2444 pwatwju.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip4.seeip.org 5 api.ipify.org 6 api.ipify.org -
resource yara_rule behavioral1/memory/2336-1-0x0000000000400000-0x00000000045F0000-memory.dmp upx behavioral1/files/0x000800000001957c-9.dat upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\pwatwju.job JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe File opened for modification C:\Windows\Tasks\pwatwju.job JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pwatwju.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2336 JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2444 1624 taskeng.exe 30 PID 1624 wrote to memory of 2444 1624 taskeng.exe 30 PID 1624 wrote to memory of 2444 1624 taskeng.exe 30 PID 1624 wrote to memory of 2444 1624 taskeng.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3645d634e5976620737eaffe304d30a7.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
C:\Windows\system32\taskeng.exetaskeng.exe {EFA8A8DE-28BB-4E49-A392-A8317C4214B8} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\ProgramData\ccck\pwatwju.exeC:\ProgramData\ccck\pwatwju.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD53645d634e5976620737eaffe304d30a7
SHA16b8f47c29a2710a5dee91f61095b71cd3bb65660
SHA256046e029c41ac8987649a05e98db75a462e6d42f5f32e871f907036d23ec2d701
SHA51200014b0a0c892718ea66630137639305da6294636598a90dcafcb7d71869bcd5912c8ee531d9265682321859da8ce4466da8a41347ecab069f182b4ae421862d