Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe
-
Size
113KB
-
MD5
d3cccef760b16a7e43adf4b21549de94
-
SHA1
844f9b7489578e74268fb66b7090ee9f9c24dc36
-
SHA256
8bda584b13deaa84c675aaec1625e02c0784a23ae00a55b3be7bead0d1459d71
-
SHA512
fcb736975e4177850e1458a0c88a74e758fa2ea2e4f1814111a481dc91df0f0b04b45e6bd6a109fd658f508091a199ef1c12e7eece18ddecea0cd407cc0d8689
-
SSDEEP
1536:GQ5+RW7xnn9v1zdQemrkGxyrTu9qe3i4MmgjEOXANQVrk0IzetC4H4bbqh+:4RW2gGxyrTu9qe3i4Mm4bk0IzecqM
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 2556 vbc.exe 1188 usbmngr.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "usbmngr.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\usbmngr.exe vbc.exe File opened for modification C:\Windows\usbmngr.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usbmngr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2796 wrote to memory of 2556 2796 d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe 83 PID 2556 wrote to memory of 1016 2556 vbc.exe 86 PID 2556 wrote to memory of 1016 2556 vbc.exe 86 PID 2556 wrote to memory of 1016 2556 vbc.exe 86 PID 2556 wrote to memory of 1188 2556 vbc.exe 87 PID 2556 wrote to memory of 1188 2556 vbc.exe 87 PID 2556 wrote to memory of 1188 2556 vbc.exe 87 PID 1016 wrote to memory of 1776 1016 cmd.exe 89 PID 1016 wrote to memory of 1776 1016 cmd.exe 89 PID 1016 wrote to memory of 1776 1016 cmd.exe 89 PID 1776 wrote to memory of 2356 1776 net.exe 90 PID 1776 wrote to memory of 2356 1776 net.exe 90 PID 1776 wrote to memory of 2356 1776 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3cccef760b16a7e43adf4b21549de94_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
-
C:\Windows\usbmngr.exe"C:\Windows\usbmngr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227