Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe
-
Size
184KB
-
MD5
d54973f7bae3f1f3cee684f6f25791c3
-
SHA1
fbb608e7aa0cc9d9d6e25cd4d28b9b1c22297944
-
SHA256
fa98a5bbb713b059a5281b6db6cb9f8a345b0e43ffd1da9392f5b9da2b5822c0
-
SHA512
f9b9a1813e57fae6b1c44dc4ddcad85642e5378d1658a0118e51b0633d04ba61894cde0ab0d2f0625be2b89737d75b30c53b459b42157e47390acd4479034904
-
SSDEEP
3072:n6h7KeLn/+4vPt+uUKUghKrjBfg3/zw1R/UYAx1iYWP:n6BVTmeJUU+f8w1R/w1iYWP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1972 aadrive32.exe 2896 aadrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2548 set thread context of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 1972 set thread context of 2896 1972 aadrive32.exe 33 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\aadrive32.exe d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe File opened for modification C:\Windows\aadrive32.exe d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log aadrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadrive32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1300 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 1300 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 1972 aadrive32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1300 2548 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 30 PID 1300 wrote to memory of 1972 1300 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 31 PID 1300 wrote to memory of 1972 1300 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 31 PID 1300 wrote to memory of 1972 1300 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 31 PID 1300 wrote to memory of 1972 1300 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 31 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33 PID 1972 wrote to memory of 2896 1972 aadrive32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\aadrive32.exeC:\Windows\aadrive32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5d54973f7bae3f1f3cee684f6f25791c3
SHA1fbb608e7aa0cc9d9d6e25cd4d28b9b1c22297944
SHA256fa98a5bbb713b059a5281b6db6cb9f8a345b0e43ffd1da9392f5b9da2b5822c0
SHA512f9b9a1813e57fae6b1c44dc4ddcad85642e5378d1658a0118e51b0633d04ba61894cde0ab0d2f0625be2b89737d75b30c53b459b42157e47390acd4479034904