Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 08:51

General

  • Target

    f321637df3c8907b2f73bec2fc6eaec6_JaffaCakes118.exe

  • Size

    255KB

  • MD5

    f321637df3c8907b2f73bec2fc6eaec6

  • SHA1

    56a916846962e81352c63026533d623aa9e9da4f

  • SHA256

    3a24f1707ab7f97b0b8ca4ffb5b2237a1b9b867f21d4e88c18fcfd8e4d38ccbc

  • SHA512

    6017720c2b805ea4ff9fc559439f0c636373c7d898a49c622f2f8f0f276e996f60ce9894c6b657cc4c47467ba4bfb221c471737e3ed1c388f1317e118f85f79a

  • SSDEEP

    3072:0/wQZtZRx5Jx0Lm2U3FEwAXDLXZAXT7xbRk2B:0dv3Umt6XDVAXJRf

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f321637df3c8907b2f73bec2fc6eaec6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f321637df3c8907b2f73bec2fc6eaec6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\f321637df3c8907b2f73bec2fc6eaec6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f321637df3c8907b2f73bec2fc6eaec6_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 140
        3⤵
        • Program crash
        PID:2724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-0-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-2-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-4-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-6-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-8-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-10-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-12-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/3044-13-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB