Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    23-06-2024 13:00

General

  • Target

    0622bf47c156139dbf039f61785b9f56_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    0622bf47c156139dbf039f61785b9f56

  • SHA1

    109e83436753cf949516513cc2cc89a1aee0e110

  • SHA256

    175254e8c3bb060acd8ff9b2f9c16fbe915db92c0ba40fb6703bc2b34c6bd5ad

  • SHA512

    b27e055ee51bf046ecdcc9234c3b029797f37fb7e66f666d35c9fec90ab72b8f0f97cd77c8ba693601caa817f5c444f9fb327e4220568d416806ed579a02d28d

  • SSDEEP

    12288:VDey6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuT:Vn5rwgxG6TSPGEU7VqvLFyIna

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0622bf47c156139dbf039f61785b9f56_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0622bf47c156139dbf039f61785b9f56_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1560
  • C:\Windows\system\VMwareService.exe
    "C:\Windows\system\VMwareService.exe"
    1⤵
    • Checks BIOS information in registry
    • Deletes itself
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\VMwareService.exe

    Filesize

    1.3MB

    MD5

    0622bf47c156139dbf039f61785b9f56

    SHA1

    109e83436753cf949516513cc2cc89a1aee0e110

    SHA256

    175254e8c3bb060acd8ff9b2f9c16fbe915db92c0ba40fb6703bc2b34c6bd5ad

    SHA512

    b27e055ee51bf046ecdcc9234c3b029797f37fb7e66f666d35c9fec90ab72b8f0f97cd77c8ba693601caa817f5c444f9fb327e4220568d416806ed579a02d28d

  • memory/1560-11-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1560-1-0x0000000000401000-0x0000000000408000-memory.dmp

    Filesize

    28KB

  • memory/1560-2-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1560-3-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1560-6-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1560-0-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-18-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-22-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-13-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-14-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-15-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-16-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-17-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-8-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-19-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-20-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-21-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-10-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-23-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-24-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-25-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-26-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-27-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-28-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-29-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-30-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-31-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2156-32-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB