Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 09:45
Behavioral task
behavioral1
Sample
JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe
-
Size
209KB
-
MD5
c4fd01d2a88af3b53d70a3b52e1a5448
-
SHA1
dbe77b56aba59e9996be9e6724dddb0dc1cf78c1
-
SHA256
1e5cab880268f538d1fc0c584a010e00f0196c258b8936138489bcfe6fbe0589
-
SHA512
16c1e4f1526d9ed47d513d7d1a5812c8cd6edb0f5d494351a08264cd3e62e6285d48f536c167b4933e0df22dad46f9dea0ff97d2f7f339dc1e8a32262ee4c120
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1Ug:cnLh9yn52rpUR5vHuRYpM+g
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Signatures
-
Systembc family
-
Executes dropped EXE 1 IoCs
pid Process 3040 mkpffau.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org -
resource yara_rule behavioral1/memory/2324-1-0x0000000000400000-0x00000000045F0000-memory.dmp upx behavioral1/files/0x000a000000016d64-7.dat upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\mkpffau.job JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe File opened for modification C:\Windows\Tasks\mkpffau.job JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkpffau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2324 JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3040 2648 taskeng.exe 32 PID 2648 wrote to memory of 3040 2648 taskeng.exe 32 PID 2648 wrote to memory of 3040 2648 taskeng.exe 32 PID 2648 wrote to memory of 3040 2648 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4fd01d2a88af3b53d70a3b52e1a5448.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
C:\Windows\system32\taskeng.exetaskeng.exe {73391206-73EE-4D16-9814-33AB1CE79806} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\ProgramData\nesal\mkpffau.exeC:\ProgramData\nesal\mkpffau.exe start2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5c4fd01d2a88af3b53d70a3b52e1a5448
SHA1dbe77b56aba59e9996be9e6724dddb0dc1cf78c1
SHA2561e5cab880268f538d1fc0c584a010e00f0196c258b8936138489bcfe6fbe0589
SHA51216c1e4f1526d9ed47d513d7d1a5812c8cd6edb0f5d494351a08264cd3e62e6285d48f536c167b4933e0df22dad46f9dea0ff97d2f7f339dc1e8a32262ee4c120