Analysis
-
max time kernel
149s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
04f4f26f908356670125c191154646bc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04f4f26f908356670125c191154646bc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
04f4f26f908356670125c191154646bc_JaffaCakes118.exe
-
Size
214KB
-
MD5
04f4f26f908356670125c191154646bc
-
SHA1
31ec52a279d495ab7bd9b783d0fcc21c296f9ad8
-
SHA256
18388fa9806280bb2adeb9bf08415c5e6b459c4b1096c8d70a8cd12e89473033
-
SHA512
db06fa8135b1c168b53cf9cad63bc07173583f626c32ec5d0889baf9d35e2193109e602d9624540067b3a04f9b094a607f73bf2568aaf2ed202b19d406be6611
-
SSDEEP
3072:s/Dti2aJ8rOLkMMAJJi/+hIYwydr5EYRUX5eQ/auAMXzezZkIK9IEctfqSbEUwXV:ss2xrOAbA8+uYiTCuAMjsX9EctfJYDnz
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 8 IoCs
Processes:
igfxbt86.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxbt86.exe = "C:\\Windows\\SysWOW64\\igfxbt86.exe:*:Enabled:Intel Backup Monitor" igfxbt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxbt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxbt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxbt86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxbt86.exe = "C:\\Windows\\SysWOW64\\igfxbt86.exe:*:Enabled:Intel Backup Monitor" igfxbt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxbt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxbt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxbt86.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 04f4f26f908356670125c191154646bc_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
igfxbt86.exepid process 2148 igfxbt86.exe -
Executes dropped EXE 2 IoCs
Processes:
igfxbt86.exeigfxbt86.exepid process 4308 igfxbt86.exe 2148 igfxbt86.exe -
Processes:
resource yara_rule behavioral2/memory/4304-0-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4304-2-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4304-3-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4304-5-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4304-4-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/2148-44-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4304-45-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4304-47-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/2148-48-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/2148-49-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/2148-50-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
igfxbt86.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Backup Monitor = "C:\\Windows\\SysWOW64\\igfxbt86.exe" igfxbt86.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exeigfxbt86.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 04f4f26f908356670125c191154646bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbt86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxbt86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 04f4f26f908356670125c191154646bc_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exeigfxbt86.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 04f4f26f908356670125c191154646bc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxbt86.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxbt86.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxbt86.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exeigfxbt86.exedescription pid process target process PID 2528 set thread context of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 4308 set thread context of 2148 4308 igfxbt86.exe igfxbt86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 04f4f26f908356670125c191154646bc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exeigfxbt86.exepid process 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 2148 igfxbt86.exe 2148 igfxbt86.exe 2148 igfxbt86.exe 2148 igfxbt86.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
04f4f26f908356670125c191154646bc_JaffaCakes118.exe04f4f26f908356670125c191154646bc_JaffaCakes118.exeigfxbt86.exeigfxbt86.exedescription pid process target process PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 2528 wrote to memory of 4304 2528 04f4f26f908356670125c191154646bc_JaffaCakes118.exe 04f4f26f908356670125c191154646bc_JaffaCakes118.exe PID 4304 wrote to memory of 4308 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe igfxbt86.exe PID 4304 wrote to memory of 4308 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe igfxbt86.exe PID 4304 wrote to memory of 4308 4304 04f4f26f908356670125c191154646bc_JaffaCakes118.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 4308 wrote to memory of 2148 4308 igfxbt86.exe igfxbt86.exe PID 2148 wrote to memory of 3528 2148 igfxbt86.exe Explorer.EXE PID 2148 wrote to memory of 3528 2148 igfxbt86.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\04f4f26f908356670125c191154646bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04f4f26f908356670125c191154646bc_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\04f4f26f908356670125c191154646bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04f4f26f908356670125c191154646bc_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxbt86.exe"C:\Windows\SysWOW64\igfxbt86.exe" C:\Users\Admin\AppData\Local\Temp\04F4F2~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxbt86.exe"C:\Windows\SysWOW64\igfxbt86.exe" C:\Users\Admin\AppData\Local\Temp\04F4F2~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\igfxbt86.exeFilesize
214KB
MD504f4f26f908356670125c191154646bc
SHA131ec52a279d495ab7bd9b783d0fcc21c296f9ad8
SHA25618388fa9806280bb2adeb9bf08415c5e6b459c4b1096c8d70a8cd12e89473033
SHA512db06fa8135b1c168b53cf9cad63bc07173583f626c32ec5d0889baf9d35e2193109e602d9624540067b3a04f9b094a607f73bf2568aaf2ed202b19d406be6611
-
memory/2148-44-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2148-48-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2148-49-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2148-50-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4304-0-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4304-2-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/4304-3-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4304-5-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4304-4-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4304-45-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4304-47-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB