Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe
-
Size
104KB
-
MD5
d72c8009be64fba34474ba6ef4bd2b2b
-
SHA1
6d4ff4cc40f8593f42ac1e58db2755d85e9f6191
-
SHA256
7201ad8697d45bedfc6e4bd620dc633c1cb1c43ac5cb14591185f7cb65b0eae3
-
SHA512
0613dd76a8d92291ab5e675a3fdb99ec39dbc84d89bb45289a13b91f71c9e80a5139dcd38cb7c3cf5ab43191b94b50c245abc47204217b7d30d20499be6b7a1b
-
SSDEEP
1536:/diVwLzzQyTiyhmUgLNi7fvytydce48qT4KTL3M6RFm2CzYDEtkBB+ZX54:0aL3QEiy7gtEce48+4KRFmSJV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\cfdrive32.exe" d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3068 cfdrive32.exe 1884 cfdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\cfdrive32.exe" d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1480 set thread context of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 3068 set thread context of 1884 3068 cfdrive32.exe 93 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\cfdrive32.exe d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe File opened for modification C:\Windows\cfdrive32.exe d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe File created C:\Windows\%windir%\logfile32.log cfdrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfdrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 3068 cfdrive32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 1480 wrote to memory of 5076 1480 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 90 PID 5076 wrote to memory of 3068 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 91 PID 5076 wrote to memory of 3068 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 91 PID 5076 wrote to memory of 3068 5076 d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe 91 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93 PID 3068 wrote to memory of 1884 3068 cfdrive32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d72c8009be64fba34474ba6ef4bd2b2b_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\cfdrive32.exe"C:\Windows\cfdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\cfdrive32.exe"C:\Windows\cfdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4360,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:81⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5d72c8009be64fba34474ba6ef4bd2b2b
SHA16d4ff4cc40f8593f42ac1e58db2755d85e9f6191
SHA2567201ad8697d45bedfc6e4bd620dc633c1cb1c43ac5cb14591185f7cb65b0eae3
SHA5120613dd76a8d92291ab5e675a3fdb99ec39dbc84d89bb45289a13b91f71c9e80a5139dcd38cb7c3cf5ab43191b94b50c245abc47204217b7d30d20499be6b7a1b