Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 03:57
Behavioral task
behavioral1
Sample
443680904e6387336410454c358d85c6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
443680904e6387336410454c358d85c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
443680904e6387336410454c358d85c6_JaffaCakes118.exe
-
Size
100KB
-
MD5
443680904e6387336410454c358d85c6
-
SHA1
dd48fd763966a3905f9eb34fb68bc0a322b83ad2
-
SHA256
f3b1eb48ef5dcb9f9dc3d915449e49e906cda9728c5a3c0de9a05e4781096c1b
-
SHA512
fe16304fe0ff5ac071f83ad7b3783c6e79f693f3f449da104feab9ba0212a797cf7d768ae0220a8f27209281ead735447cf3a10e07c494b4db2a23afe4ab29ff
-
SSDEEP
1536:3zV9QkOoSufUbRwMNxDbXZGXbTVre0qJGZSOqm5Mb+KR0Nc8QsJq3:jVFOoSusbRZNxRoTjy6e0Nc8QsC
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
118.223.26.15:1337
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 16 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\MDM 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\PUBLICPROFILE\LOGGING 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\RESTRICTEDSERVICES\CONFIGURABLE 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\LOGGING 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\LOGGING 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\RESTRICTEDINTERFACES\IFISO 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\RESTRICTEDSERVICES\STATIC\SYSTEM 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\RESTRICTEDSERVICES\APPISO\FIREWALLRULES 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedInterfaces 443680904e6387336410454c358d85c6_JaffaCakes118.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\WSCSVC\PARAMETERS 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\WSCSVC\SECURITY 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\MPSSVC\PARAMETERS\ACSERVICE 443680904e6387336410454c358d85c6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters 443680904e6387336410454c358d85c6_JaffaCakes118.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\windows\system32\drivers\etc\hosts 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created C:\windows\system32\drivers\etc\hosts 443680904e6387336410454c358d85c6_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3604 payload.exe 1932 payload.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 443680904e6387336410454c358d85c6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\payload_l = "C:\\Windows\\payload_l.exe" 443680904e6387336410454c358d85c6_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 48 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\g:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\j:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\l:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\m:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\o:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\p:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\e:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\e:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\x:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\l:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\t:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\w:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\z:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\h:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\i:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\j:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\n:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\q:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\s:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\v:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\c:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\h:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\k:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\y:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\z:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\d:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\g:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\i:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\t:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\u:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\w:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\x:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\c:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\d:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\o:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\r:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\r:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\f:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\k:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\f:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\y:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\p:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\q:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File created \??\s:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\u:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\v:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\m:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification \??\n:\autorun.inf 443680904e6387336410454c358d85c6_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\payload_l.exe 443680904e6387336410454c358d85c6_JaffaCakes118.exe File opened for modification C:\windows\payload_l.exe 443680904e6387336410454c358d85c6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3604 2572 443680904e6387336410454c358d85c6_JaffaCakes118.exe 83 PID 2572 wrote to memory of 3604 2572 443680904e6387336410454c358d85c6_JaffaCakes118.exe 83 PID 2572 wrote to memory of 3604 2572 443680904e6387336410454c358d85c6_JaffaCakes118.exe 83 PID 2572 wrote to memory of 1932 2572 443680904e6387336410454c358d85c6_JaffaCakes118.exe 91 PID 2572 wrote to memory of 1932 2572 443680904e6387336410454c358d85c6_JaffaCakes118.exe 91 PID 2572 wrote to memory of 1932 2572 443680904e6387336410454c358d85c6_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\443680904e6387336410454c358d85c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\443680904e6387336410454c358d85c6_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Drops file in Drivers directory
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\payload.exe.\payload.exe2⤵
- Executes dropped EXE
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\payload.exe.\payload.exe2⤵
- Executes dropped EXE
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54e925c821c0298b84730b946c00eb9f3
SHA17f9ccdfe6e696f04abb69f60cce71b86e6a58c7d
SHA2566a35cf1783360d7bafe76319ce2c4b9a448ee8ad4a12eca44c0af27555f4e5cd
SHA5127ec32b961ff617c67fb4411510a7dfb6b0beaad46d2d268e74bb9e41777fea526cf635ae406b5557bdfc679dea3820d57b58c510a0697da3249bc49c1af33a4f
-
Filesize
63B
MD510190fa85f8da43aac0669c23127341f
SHA1e27b5c412b10688441554fa0d5ddba4e1b094f87
SHA2569133b59b498c74cfd51687046536d267dc539320f0e87293d19a78db6f57e0c8
SHA51264ae064dd4864f774cd0e7056fae979da52a7e49b9ebf24c4491cbe4055f7a7d38f584eb9133185906d3901d7a5df13f42c9135c1374ebdb683706df77ad49a7
-
Filesize
100KB
MD5443680904e6387336410454c358d85c6
SHA1dd48fd763966a3905f9eb34fb68bc0a322b83ad2
SHA256f3b1eb48ef5dcb9f9dc3d915449e49e906cda9728c5a3c0de9a05e4781096c1b
SHA512fe16304fe0ff5ac071f83ad7b3783c6e79f693f3f449da104feab9ba0212a797cf7d768ae0220a8f27209281ead735447cf3a10e07c494b4db2a23afe4ab29ff