Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe
-
Size
250KB
-
MD5
d6edb56b37fd2fef68e326f06066937c
-
SHA1
61ac2d26e058f2a9c219b7219099e00cedb5fc0d
-
SHA256
4e876bf933e2f7244904dd14950f3f7781e97a8e964838b6a2257055e5f14a33
-
SHA512
990a454d667a701da56889db3d72fb566adfb41c691fd6fd0eb877374ed728469c1e506e5ed71ef92d4b7db0337362221feb942439a0dbf9306c0d5f596b2e1c
-
SSDEEP
6144:e00ads/WnIufgOb6m/qNica8L9ATGbxzcOMCjFrl+:eJoeWn8Ob2Ach+qzcPCBrl+
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmphn32.exe = "C:\\Windows\\SysWOW64\\wmphn32.exe:*:Enabled:Windows Host Controller" wmphn32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmphn32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmphn32.exe = "C:\\Windows\\SysWOW64\\wmphn32.exe:*:Enabled:Windows Host Controller" wmphn32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmphn32.exe -
Deletes itself 1 IoCs
pid Process 2736 wmphn32.exe -
Executes dropped EXE 2 IoCs
pid Process 2196 wmphn32.exe 2736 wmphn32.exe -
Loads dropped DLL 3 IoCs
pid Process 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 2196 wmphn32.exe -
resource yara_rule behavioral1/memory/2112-5-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-4-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-10-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-9-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-8-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-7-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-2-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2112-23-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2736-37-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2736-36-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2736-35-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2736-34-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2736-38-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2736-42-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Host Controller = "C:\\Windows\\SysWOW64\\wmphn32.exe" wmphn32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmphn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmphn32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmphn32.exe File opened for modification C:\Windows\SysWOW64\ d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmphn32.exe d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmphn32.exe d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2120 set thread context of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2196 set thread context of 2736 2196 wmphn32.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmphn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmphn32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 2736 wmphn32.exe 2736 wmphn32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2112 2120 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2196 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2196 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2196 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2196 2112 d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe 32 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2196 wrote to memory of 2736 2196 wmphn32.exe 33 PID 2736 wrote to memory of 1212 2736 wmphn32.exe 21 PID 2736 wrote to memory of 1212 2736 wmphn32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6edb56b37fd2fef68e326f06066937c_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\wmphn32.exe"C:\Windows\SysWOW64\wmphn32.exe" C:\Users\Admin\AppData\Local\Temp\D6EDB5~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\wmphn32.exe"C:\Windows\SysWOW64\wmphn32.exe" C:\Users\Admin\AppData\Local\Temp\D6EDB5~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5d6edb56b37fd2fef68e326f06066937c
SHA161ac2d26e058f2a9c219b7219099e00cedb5fc0d
SHA2564e876bf933e2f7244904dd14950f3f7781e97a8e964838b6a2257055e5f14a33
SHA512990a454d667a701da56889db3d72fb566adfb41c691fd6fd0eb877374ed728469c1e506e5ed71ef92d4b7db0337362221feb942439a0dbf9306c0d5f596b2e1c