Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe
-
Size
184KB
-
MD5
d54973f7bae3f1f3cee684f6f25791c3
-
SHA1
fbb608e7aa0cc9d9d6e25cd4d28b9b1c22297944
-
SHA256
fa98a5bbb713b059a5281b6db6cb9f8a345b0e43ffd1da9392f5b9da2b5822c0
-
SHA512
f9b9a1813e57fae6b1c44dc4ddcad85642e5378d1658a0118e51b0633d04ba61894cde0ab0d2f0625be2b89737d75b30c53b459b42157e47390acd4479034904
-
SSDEEP
3072:n6h7KeLn/+4vPt+uUKUghKrjBfg3/zw1R/UYAx1iYWP:n6BVTmeJUU+f8w1R/w1iYWP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 aadrive32.exe 5080 aadrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3480 set thread context of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 2336 set thread context of 5080 2336 aadrive32.exe 93 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\aadrive32.exe d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe File opened for modification C:\Windows\aadrive32.exe d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log aadrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 2336 aadrive32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 3480 wrote to memory of 1512 3480 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 87 PID 1512 wrote to memory of 2336 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 88 PID 1512 wrote to memory of 2336 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 88 PID 1512 wrote to memory of 2336 1512 d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe 88 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93 PID 2336 wrote to memory of 5080 2336 aadrive32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d54973f7bae3f1f3cee684f6f25791c3_JaffaCakes118.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\aadrive32.exeC:\Windows\aadrive32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5d54973f7bae3f1f3cee684f6f25791c3
SHA1fbb608e7aa0cc9d9d6e25cd4d28b9b1c22297944
SHA256fa98a5bbb713b059a5281b6db6cb9f8a345b0e43ffd1da9392f5b9da2b5822c0
SHA512f9b9a1813e57fae6b1c44dc4ddcad85642e5378d1658a0118e51b0633d04ba61894cde0ab0d2f0625be2b89737d75b30c53b459b42157e47390acd4479034904