Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe
-
Size
519KB
-
MD5
a1166696db5ce5b7e3b4b4cfafbba81e
-
SHA1
bdbe6936a391ad5d1a85570ef86046ddbd208bb2
-
SHA256
f56ad077785f0dfd0919367d6c3148d83cd515421db7b8f75e57b5a6c4281129
-
SHA512
fb4b9654aa43f195992392e0981be6411e2b87eb611ecc5a6f793f48e72ab8b338fe0e1096c86b5a6918afba1ba3eaef2c5b1cb884b5be94587a675a57ad266b
-
SSDEEP
12288:RE+s0JYj9ui+4RRuq06QqaxARKvUjE3yZ2WpufErS5:G5N9P5RgRvUuyBufErS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\sysdrv32.sys wmibus.exe -
Deletes itself 1 IoCs
pid Process 592 wmibus.exe -
Executes dropped EXE 1 IoCs
pid Process 592 wmibus.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wmibus.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2368 a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe 592 wmibus.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\wmibus.exe a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe File opened for modification C:\Windows\system\wmibus.exe a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmibus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 21 IoCs
Uses commandline utility to view network configuration.
pid Process 2188 ipconfig.exe 540 ipconfig.exe 3004 ipconfig.exe 1524 ipconfig.exe 2068 ipconfig.exe 288 ipconfig.exe 2316 ipconfig.exe 1748 ipconfig.exe 3024 ipconfig.exe 1876 ipconfig.exe 1580 ipconfig.exe 2292 ipconfig.exe 3000 ipconfig.exe 2132 ipconfig.exe 2620 ipconfig.exe 1804 ipconfig.exe 3020 ipconfig.exe 1772 ipconfig.exe 2264 ipconfig.exe 2368 ipconfig.exe 1692 ipconfig.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wmibus.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wmibus.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmibus.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wmibus.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wmibus.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmibus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe 592 wmibus.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 592 wmibus.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 592 wrote to memory of 2620 592 wmibus.exe 32 PID 592 wrote to memory of 2620 592 wmibus.exe 32 PID 592 wrote to memory of 2620 592 wmibus.exe 32 PID 592 wrote to memory of 2620 592 wmibus.exe 32 PID 592 wrote to memory of 2068 592 wmibus.exe 34 PID 592 wrote to memory of 2068 592 wmibus.exe 34 PID 592 wrote to memory of 2068 592 wmibus.exe 34 PID 592 wrote to memory of 2068 592 wmibus.exe 34 PID 592 wrote to memory of 1748 592 wmibus.exe 36 PID 592 wrote to memory of 1748 592 wmibus.exe 36 PID 592 wrote to memory of 1748 592 wmibus.exe 36 PID 592 wrote to memory of 1748 592 wmibus.exe 36 PID 592 wrote to memory of 3024 592 wmibus.exe 38 PID 592 wrote to memory of 3024 592 wmibus.exe 38 PID 592 wrote to memory of 3024 592 wmibus.exe 38 PID 592 wrote to memory of 3024 592 wmibus.exe 38 PID 592 wrote to memory of 2188 592 wmibus.exe 40 PID 592 wrote to memory of 2188 592 wmibus.exe 40 PID 592 wrote to memory of 2188 592 wmibus.exe 40 PID 592 wrote to memory of 2188 592 wmibus.exe 40 PID 592 wrote to memory of 540 592 wmibus.exe 42 PID 592 wrote to memory of 540 592 wmibus.exe 42 PID 592 wrote to memory of 540 592 wmibus.exe 42 PID 592 wrote to memory of 540 592 wmibus.exe 42 PID 592 wrote to memory of 2316 592 wmibus.exe 44 PID 592 wrote to memory of 2316 592 wmibus.exe 44 PID 592 wrote to memory of 2316 592 wmibus.exe 44 PID 592 wrote to memory of 2316 592 wmibus.exe 44 PID 592 wrote to memory of 1692 592 wmibus.exe 46 PID 592 wrote to memory of 1692 592 wmibus.exe 46 PID 592 wrote to memory of 1692 592 wmibus.exe 46 PID 592 wrote to memory of 1692 592 wmibus.exe 46 PID 592 wrote to memory of 1876 592 wmibus.exe 48 PID 592 wrote to memory of 1876 592 wmibus.exe 48 PID 592 wrote to memory of 1876 592 wmibus.exe 48 PID 592 wrote to memory of 1876 592 wmibus.exe 48 PID 592 wrote to memory of 288 592 wmibus.exe 50 PID 592 wrote to memory of 288 592 wmibus.exe 50 PID 592 wrote to memory of 288 592 wmibus.exe 50 PID 592 wrote to memory of 288 592 wmibus.exe 50 PID 592 wrote to memory of 1580 592 wmibus.exe 52 PID 592 wrote to memory of 1580 592 wmibus.exe 52 PID 592 wrote to memory of 1580 592 wmibus.exe 52 PID 592 wrote to memory of 1580 592 wmibus.exe 52 PID 592 wrote to memory of 2292 592 wmibus.exe 54 PID 592 wrote to memory of 2292 592 wmibus.exe 54 PID 592 wrote to memory of 2292 592 wmibus.exe 54 PID 592 wrote to memory of 2292 592 wmibus.exe 54 PID 592 wrote to memory of 3020 592 wmibus.exe 56 PID 592 wrote to memory of 3020 592 wmibus.exe 56 PID 592 wrote to memory of 3020 592 wmibus.exe 56 PID 592 wrote to memory of 3020 592 wmibus.exe 56 PID 592 wrote to memory of 3000 592 wmibus.exe 58 PID 592 wrote to memory of 3000 592 wmibus.exe 58 PID 592 wrote to memory of 3000 592 wmibus.exe 58 PID 592 wrote to memory of 3000 592 wmibus.exe 58 PID 592 wrote to memory of 1772 592 wmibus.exe 60 PID 592 wrote to memory of 1772 592 wmibus.exe 60 PID 592 wrote to memory of 1772 592 wmibus.exe 60 PID 592 wrote to memory of 1772 592 wmibus.exe 60 PID 592 wrote to memory of 3004 592 wmibus.exe 62 PID 592 wrote to memory of 3004 592 wmibus.exe 62 PID 592 wrote to memory of 3004 592 wmibus.exe 62 PID 592 wrote to memory of 3004 592 wmibus.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1166696db5ce5b7e3b4b4cfafbba81e_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
C:\Windows\system\wmibus.exe"C:\Windows\system\wmibus.exe"1⤵
- Drops file in Drivers directory
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2620
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2068
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1748
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3024
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2188
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:540
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2316
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1692
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1876
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:288
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1580
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2292
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3020
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3000
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1772
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3004
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2264
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2132
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1804
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2368
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD5a1166696db5ce5b7e3b4b4cfafbba81e
SHA1bdbe6936a391ad5d1a85570ef86046ddbd208bb2
SHA256f56ad077785f0dfd0919367d6c3148d83cd515421db7b8f75e57b5a6c4281129
SHA512fb4b9654aa43f195992392e0981be6411e2b87eb611ecc5a6f793f48e72ab8b338fe0e1096c86b5a6918afba1ba3eaef2c5b1cb884b5be94587a675a57ad266b