Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe
-
Size
106KB
-
MD5
bbf0c8b10e3f739f2bd1cc3abbe6b073
-
SHA1
19cb15692e8a674421821f58f6bed4160744ed73
-
SHA256
339daf7546bbaae7cf03222ab127d726bca8f2435ed4465a7f381b0ec417c82e
-
SHA512
d11e088d2a0e46fb75a78ffb1e8639ad4eb97234f253ad0b6c96eb302e396b554111aeb720e434d19ee0d2dc10768fca7a26c48d6b1e834b26594675fd691e1e
-
SSDEEP
3072:P5a0pGtk+Rd2p2CXiOzgl2IwLFMnoggfRuv3:xa0EtoiKgl2IwLKndgJuv3
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 1 IoCs
pid Process 1208 kPDTGuEflbHeYkyT.exe -
resource yara_rule behavioral1/memory/1208-14-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0008000000016491-9.dat upx behavioral1/memory/1208-15-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1208-25-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\kPDTGuEflbHeYkyT.exe WScript.exe File created C:\Windows\kPDTGuEflbHeYkyT.vbs bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe File opened for modification C:\Windows\kPDTGuEflbHeYkyT.vbs bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kPDTGuEflbHeYkyT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2360 1264 bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe 30 PID 1264 wrote to memory of 2360 1264 bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe 30 PID 1264 wrote to memory of 2360 1264 bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe 30 PID 1264 wrote to memory of 2360 1264 bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe 30 PID 2360 wrote to memory of 1208 2360 WScript.exe 31 PID 2360 wrote to memory of 1208 2360 WScript.exe 31 PID 2360 wrote to memory of 1208 2360 WScript.exe 31 PID 2360 wrote to memory of 1208 2360 WScript.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\kPDTGuEflbHeYkyT.vbs"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\kPDTGuEflbHeYkyT.exe"C:\Windows\kPDTGuEflbHeYkyT.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD56de166b671939345fc1e3f96e3b2dbc4
SHA1d1f32d8fd39835fc4f65891e4e5faf44e7b92e9e
SHA256205cf76ec45fc035ff37bb2cf700f5c138127f6af687b6cfa852e03dff66e166
SHA5126152e2713f38e75475c82ecb88a2983d5e955ac016748156624dd86f49cb6f088160c73fe847495f2dc42e8994215a39eb527c0dbf3b66b0aa8a6bdf1e61ce27
-
Filesize
24KB
MD5ed414573e4bb2a396de025e67fef551d
SHA10b2acdd0a8abbc60cc0fdc4dc6f89a78f99c56db
SHA25675b1e86915e837df6b839e4d68a6d0cef0fda58403751b987aaf847819088cb1
SHA51273dedb5b2e2a221a845ec6e55bfbbdd72dbe189642295ac87f868364c971995fee0a37dd5a88e3074a50b8b7bffb6f1aeea1a15d0dc430840c60e71070b13804