Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 11:17
Static task
static1
Behavioral task
behavioral1
Sample
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe
-
Size
240KB
-
MD5
0580ae61006da9e62ed6282ab0d95478
-
SHA1
1d471f757b7d8157681f73714e86b5a4bf15a45c
-
SHA256
1456c2e7b003c70bb0605f3567967a38827885d78e42c7ea35b192b217580919
-
SHA512
abddbffcdee6362b336901bcf8ef9b7b10929648e1ceafafa86c0f65434e9838a3b66d259732035d486020e18a435914f76eb7d73e40e51423301acf649f1541
-
SSDEEP
3072:gRiUfrKD/qa6uGkgIkeiZhUl2872dzBvWu036AyMWwwtu4DOQ4DkC7dcb43sASjZ:UfryWuUIUhfddv+3pwVDMTw1
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 8 IoCs
Processes:
igfxdh86.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxdh86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxdh86.exe = "C:\\Windows\\SysWOW64\\igfxdh86.exe:*:Enabled:Intel Device Host" igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxdh86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxdh86.exe = "C:\\Windows\\SysWOW64\\igfxdh86.exe:*:Enabled:Intel Device Host" igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxdh86.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
igfxdh86.exepid process 3628 igfxdh86.exe -
Executes dropped EXE 2 IoCs
Processes:
igfxdh86.exeigfxdh86.exepid process 3704 igfxdh86.exe 3628 igfxdh86.exe -
Processes:
resource yara_rule behavioral2/memory/3368-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3368-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3368-3-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3368-4-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3628-42-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3368-44-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3628-46-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3628-47-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3628-48-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3628-50-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
igfxdh86.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Device Host = "C:\\Windows\\SysWOW64\\igfxdh86.exe" igfxdh86.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exeigfxdh86.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdh86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdh86.exe -
Drops file in System32 directory 4 IoCs
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exeigfxdh86.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdh86.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdh86.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdh86.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exeigfxdh86.exedescription pid process target process PID 4944 set thread context of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 3704 set thread context of 3628 3704 igfxdh86.exe igfxdh86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exeigfxdh86.exepid process 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 3628 igfxdh86.exe 3628 igfxdh86.exe 3628 igfxdh86.exe 3628 igfxdh86.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exeigfxdh86.exeigfxdh86.exedescription pid process target process PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 4944 wrote to memory of 3368 4944 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe PID 3368 wrote to memory of 3704 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe igfxdh86.exe PID 3368 wrote to memory of 3704 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe igfxdh86.exe PID 3368 wrote to memory of 3704 3368 0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3704 wrote to memory of 3628 3704 igfxdh86.exe igfxdh86.exe PID 3628 wrote to memory of 3436 3628 igfxdh86.exe Explorer.EXE PID 3628 wrote to memory of 3436 3628 igfxdh86.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0580ae61006da9e62ed6282ab0d95478_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxdh86.exe"C:\Windows\SysWOW64\igfxdh86.exe" C:\Users\Admin\AppData\Local\Temp\0580AE~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxdh86.exe"C:\Windows\SysWOW64\igfxdh86.exe" C:\Users\Admin\AppData\Local\Temp\0580AE~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\igfxdh86.exeFilesize
240KB
MD50580ae61006da9e62ed6282ab0d95478
SHA11d471f757b7d8157681f73714e86b5a4bf15a45c
SHA2561456c2e7b003c70bb0605f3567967a38827885d78e42c7ea35b192b217580919
SHA512abddbffcdee6362b336901bcf8ef9b7b10929648e1ceafafa86c0f65434e9838a3b66d259732035d486020e18a435914f76eb7d73e40e51423301acf649f1541
-
memory/3368-0-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3368-2-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3368-3-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3368-4-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3368-44-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3628-42-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3628-46-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3628-47-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3628-48-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/3628-50-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB