Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe
-
Size
284KB
-
MD5
421baa0323a230ca71d7ab70ec63ee8b
-
SHA1
ff65959682ba1f90605c0656c3b27ddd32a02abe
-
SHA256
6f33157f6cb11b56825af6bcae539938574116e59a4b95c1e90c8560e386d2b1
-
SHA512
7bdb8c712a5bb739c8c428fef98fe4accb1d183a6dab23c0885a70fe2ac7d495a9208ece7a8fad56df2808da485760b54336a4d46813ccf7de4c038b3c7397eb
-
SSDEEP
6144:ynkNfhTgg/aHh/cXG7qU/YvGbEFy5pIV0y0tLojI0z7v:KkxGpBWWzgvQdpol0tLoTX
Malware Config
Extracted
Family
systembc
C2
185.173.39.49:4001
Signatures
-
Systembc family
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe File opened for modification C:\Windows\Tasks\wow64.job JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2896 1956 taskeng.exe 31 PID 1956 wrote to memory of 2896 1956 taskeng.exe 31 PID 1956 wrote to memory of 2896 1956 taskeng.exe 31 PID 1956 wrote to memory of 2896 1956 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2312
-
C:\Windows\system32\taskeng.exetaskeng.exe {FC0A4337-EA5F-444A-8B8C-C34E2B6637BD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_421baa0323a230ca71d7ab70ec63ee8b.exe start2⤵PID:2896
-