Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe
-
Size
15KB
-
MD5
fc6bcd2d90675df3765fadb40c322c2c
-
SHA1
26f512df0afb819c8998a1a689c8d4714a825ff0
-
SHA256
ff46c12456ecb9d60a0e3a3f1504d800471dc06c002287f36e41e03ad7d7ac70
-
SHA512
b2569f7a6c5997d6222be3468aec53c8a4951e4648d5ceb25d70996fe33faf3d2a8ca8c490159764517e5d85f9aac09a048e3589566688e1e5ea1487a426196e
-
SSDEEP
192:I8PW8guKnghi2BR8k5PF+nbGG2dqsF7cXlNIFHWMzzwBTjfcor5lzsIWrXOLVWU4:JW84nglBRBl6bG584HUFLcWZs7C9RTS
Malware Config
Extracted
metasploit
windows/reverse_tcp_dns
mclean-43290.portmap.host:60886
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4884 2456 WerFault.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe 920 1904 WerFault.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe 4316 5032 WerFault.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe 3876 636 WerFault.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe 2652 2728 WerFault.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe 3728 4220 WerFault.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exefc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exedescription pid process target process PID 2456 wrote to memory of 1904 2456 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 2456 wrote to memory of 1904 2456 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 2456 wrote to memory of 1904 2456 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 1904 wrote to memory of 5032 1904 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 1904 wrote to memory of 5032 1904 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 1904 wrote to memory of 5032 1904 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 5032 wrote to memory of 636 5032 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 5032 wrote to memory of 636 5032 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 5032 wrote to memory of 636 5032 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 636 wrote to memory of 2728 636 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 636 wrote to memory of 2728 636 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 636 wrote to memory of 2728 636 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 2728 wrote to memory of 4220 2728 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 2728 wrote to memory of 4220 2728 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 2728 wrote to memory of 4220 2728 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 4220 wrote to memory of 1692 4220 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 4220 wrote to memory of 1692 4220 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe PID 4220 wrote to memory of 1692 4220 fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc6bcd2d90675df3765fadb40c322c2c_JaffaCakes118.exe"7⤵PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 17007⤵
- Program crash
PID:3728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 17046⤵
- Program crash
PID:2652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 17045⤵
- Program crash
PID:3876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 17324⤵
- Program crash
PID:4316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 17043⤵
- Program crash
PID:920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 17322⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2456 -ip 24561⤵PID:1140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1904 -ip 19041⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5032 -ip 50321⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 636 -ip 6361⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2728 -ip 27281⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4220 -ip 42201⤵PID:2780