Analysis
-
max time kernel
104s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe
-
Size
94KB
-
MD5
d13152917c0707af6725699cdbdbe9ca
-
SHA1
a312a91701ec5bc62ff6e3312d29172328253264
-
SHA256
7b14187978517b0b844af26590aabda8e0e35ec673c4314538ac837385945cdd
-
SHA512
b194e8a174301e91932ec8789c12bbac3073ba4f9b45e89cb0b9297ae081f3d77c5520ad420b915f276be24697de038e76c09631dcc9effc98f3d55e6372aec1
-
SSDEEP
1536:XLaEeMA2CNkm0XU4ZX4eFuZwaR4mm2ntGwizYXgTO3FV6IDQ/ABbr:cMA5kPXwEGGm7tVdGOVV6cV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 2440 3592 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88 PID 5068 wrote to memory of 3592 5068 d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d13152917c0707af6725699cdbdbe9caJaffaCakes118.exe"2⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 123⤵
- Program crash
PID:2440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3592 -ip 35921⤵PID:3680