Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe
-
Size
113KB
-
MD5
d310330ef13f8869ea1701800008ffc0
-
SHA1
abdfeba5fe5046006437b8352373dbdee2e25120
-
SHA256
58ebbbd18b52a2575838b6c49c76bf3c1e470f24eea505f47a7e65fde555ff68
-
SHA512
1d6568a83949594c2b1338f13e2a5b95609248e51ae629572a5a2c976fbf73ee9f55d7c3697cb2ddfbf62154c72847fef4e65cdbf529e3264439a4bbc964f1d1
-
SSDEEP
3072:GmmboOJbFdgqt8pCRGy9XqYgqXubbaZ90v5NpXIo:u0OJbFqqOiGyBgqXuvL
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 2008 usb_drv.exe 2224 usb_drv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Universal Bus device = "usb_drv.exe" d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2480 set thread context of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2008 set thread context of 2224 2008 usb_drv.exe 36 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\usb_drv.exe d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe File opened for modification C:\Windows\usb_drv.exe d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usb_drv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usb_drv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2492 2480 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 30 PID 2492 wrote to memory of 1952 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 31 PID 2492 wrote to memory of 1952 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 31 PID 2492 wrote to memory of 1952 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 31 PID 2492 wrote to memory of 1952 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2008 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 33 PID 2492 wrote to memory of 2008 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 33 PID 2492 wrote to memory of 2008 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 33 PID 2492 wrote to memory of 2008 2492 d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe 33 PID 1952 wrote to memory of 2164 1952 cmd.exe 34 PID 1952 wrote to memory of 2164 1952 cmd.exe 34 PID 1952 wrote to memory of 2164 1952 cmd.exe 34 PID 1952 wrote to memory of 2164 1952 cmd.exe 34 PID 2164 wrote to memory of 2652 2164 net.exe 35 PID 2164 wrote to memory of 2652 2164 net.exe 35 PID 2164 wrote to memory of 2652 2164 net.exe 35 PID 2164 wrote to memory of 2652 2164 net.exe 35 PID 2008 wrote to memory of 2224 2008 usb_drv.exe 36 PID 2008 wrote to memory of 2224 2008 usb_drv.exe 36 PID 2008 wrote to memory of 2224 2008 usb_drv.exe 36 PID 2008 wrote to memory of 2224 2008 usb_drv.exe 36 PID 2008 wrote to memory of 2224 2008 usb_drv.exe 36 PID 2008 wrote to memory of 2224 2008 usb_drv.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d310330ef13f8869ea1701800008ffc0_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
-
C:\Windows\usb_drv.exe"C:\Windows\usb_drv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\usb_drv.exe"C:\Windows\usb_drv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5d310330ef13f8869ea1701800008ffc0
SHA1abdfeba5fe5046006437b8352373dbdee2e25120
SHA25658ebbbd18b52a2575838b6c49c76bf3c1e470f24eea505f47a7e65fde555ff68
SHA5121d6568a83949594c2b1338f13e2a5b95609248e51ae629572a5a2c976fbf73ee9f55d7c3697cb2ddfbf62154c72847fef4e65cdbf529e3264439a4bbc964f1d1
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227