Analysis
-
max time kernel
7s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
f56cbedf051f473ce6bc625706b029dd_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f56cbedf051f473ce6bc625706b029dd_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
f56cbedf051f473ce6bc625706b029dd
-
SHA1
4513d8f1905194c1537088097bbe0d6f09b47ebc
-
SHA256
6f0af1f782289f75b963ac429399a3fecd4562b43d92ec8af604a697fc65d570
-
SHA512
fb5b6d0afb4f3f1428e9bce03b99c6c3b0c35f5fd17274a649665ce3342ce0b3a18676e1b2866e1fdfe5d40ddb7ab5e80605549ae219016168d5b3f05ca9c820
-
SSDEEP
98304:QDdR08gz5K/dKINhNCPjTl24xdoV/w+HX8xAglnLoL:1F1KjhNCLB+XglUL
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1476-2-0x00000000058C0000-0x00000000061E6000-memory.dmp family_glupteba behavioral2/memory/1476-3-0x0000000000400000-0x000000000367B000-memory.dmp family_glupteba behavioral2/memory/1476-4-0x0000000000400000-0x000000000367B000-memory.dmp family_glupteba behavioral2/memory/1476-6-0x00000000058C0000-0x00000000061E6000-memory.dmp family_glupteba behavioral2/memory/4948-8-0x0000000000400000-0x000000000367B000-memory.dmp family_glupteba behavioral2/memory/2440-16-0x0000000000400000-0x000000000367B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2688 netsh.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 35 Go-http-client/1.1 HTTP User-Agent header 36 Go-http-client/1.1 HTTP User-Agent header 20 Go-http-client/1.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\f56cbedf051f473ce6bc625706b029dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f56cbedf051f473ce6bc625706b029dd_JaffaCakes118.exe"1⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\f56cbedf051f473ce6bc625706b029dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f56cbedf051f473ce6bc625706b029dd_JaffaCakes118.exe"2⤵PID:4948
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3576
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2688 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /197-1973⤵PID:2440
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.5MB
MD5f56cbedf051f473ce6bc625706b029dd
SHA14513d8f1905194c1537088097bbe0d6f09b47ebc
SHA2566f0af1f782289f75b963ac429399a3fecd4562b43d92ec8af604a697fc65d570
SHA512fb5b6d0afb4f3f1428e9bce03b99c6c3b0c35f5fd17274a649665ce3342ce0b3a18676e1b2866e1fdfe5d40ddb7ab5e80605549ae219016168d5b3f05ca9c820
-
memory/1476-2-0x00000000058C0000-0x00000000061E6000-memory.dmpFilesize
9.1MB
-
memory/1476-3-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/1476-4-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/1476-6-0x00000000058C0000-0x00000000061E6000-memory.dmpFilesize
9.1MB
-
memory/1476-1-0x0000000005470000-0x00000000058B6000-memory.dmpFilesize
4.3MB
-
memory/2440-28-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-30-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-15-0x0000000005800000-0x0000000005D00000-memory.dmpFilesize
5.0MB
-
memory/2440-16-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-17-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-36-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-23-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-24-0x0000000005800000-0x0000000005D00000-memory.dmpFilesize
5.0MB
-
memory/2440-25-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-26-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-27-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-35-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-29-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-34-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-31-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-32-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/2440-33-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/4948-13-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB
-
memory/4948-7-0x00000000053A0000-0x00000000057E1000-memory.dmpFilesize
4.3MB
-
memory/4948-8-0x0000000000400000-0x000000000367B000-memory.dmpFilesize
50.5MB