Analysis
-
max time kernel
106s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
d7c146ebd5bffffd702a38bf891196ab_JaffaCakes118.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7c146ebd5bffffd702a38bf891196ab_JaffaCakes118.jar
Resource
win10v2004-20240802-en
General
-
Target
d7c146ebd5bffffd702a38bf891196ab_JaffaCakes118.jar
-
Size
50KB
-
MD5
d7c146ebd5bffffd702a38bf891196ab
-
SHA1
f717579e1eb878fafe60525564a6dea3ff22922d
-
SHA256
b590489f91ba11b4b304f3282293b932442da2614bf86ebeed08f9e299cb89d3
-
SHA512
4e0bfc56aae13cf28553c4fd500539f1f38892c7ebcbaf898bb88f6f668e1c5b9ab91399d669fa1b011a991e9d68d9334f431712d3c9b92ad18b368e04bf0bc6
-
SSDEEP
768:BDzyqV/kcfpGdqjZQLHmFyOdpuzTZROCQ0VqXJUod3AME/JQ6zlzUtsJ/Blvx:JV/kcfpsgZQLHzGp+ZIFMqXJU4ApTJnZ
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
208.118.237.54:53
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 1 IoCs
pid Process 1984 nJRxgsIi.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.118.237.54 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nJRxgsIi.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2052 4060 java.exe 87 PID 4060 wrote to memory of 2052 4060 java.exe 87 PID 2052 wrote to memory of 3112 2052 java.exe 89 PID 2052 wrote to memory of 3112 2052 java.exe 89 PID 3112 wrote to memory of 1984 3112 java.exe 91 PID 3112 wrote to memory of 1984 3112 java.exe 91 PID 3112 wrote to memory of 1984 3112 java.exe 91
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\d7c146ebd5bffffd702a38bf891196ab_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -classpath C:\Users\Admin\AppData\Local\Temp\~spawn2687134139925715625.tmp.dir metasploit.Payload2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -classpath C:\Users\Admin\AppData\Local\Temp\~spawn8082888014579673637.tmp.dir metasploit.Payload3⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\~spawn214472803898254708.tmp.dir\nJRxgsIi.exeC:\Users\Admin\AppData\Local\Temp\~spawn214472803898254708.tmp.dir\nJRxgsIi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD571abccb84fa5539de44c07d273b58283
SHA1e11bd395c7f7e461a1c28d600971bebeff5fdf30
SHA256ebc564caf0ca9f2b4bc18438a2273226dc6810c206a2a13aeb135df9618dbaf5
SHA512e4b7211ce094ec72a48309d17442fb2eb19ab90efa3bbcc454ee9832dbc9b1827e33f337ab7d68fd62f16bfc260010a2c97951b8fe9d56d6b8d557592258b40f
-
Filesize
72KB
MD5bcbce9df19d17c3a48a2a1b034d26e35
SHA1f60b4551dd224edee1147719d89a6b0e507b7c98
SHA256dcd08be5c93a3c2e061a9de0f15e5269218806bd8fb7224ea54e6a4da544311f
SHA5124d61e86d8807f5ad14bdb701159a779fa83d4281d653af0db602803dab14172f4ab048db3a6a5f87f04aaeb6fefe73ab845a30ef2eb9cec7ce4a41dc4a8e1cca
-
Filesize
150B
MD54d715fc409d806062ef585e56a2df0a7
SHA1884948808e7d387429014a8b60543ef6d742793e
SHA256ab3b42706c4dc045ca0e6db5fe3526f3f3567ad497185ac194a7e05b76a11ed0
SHA51287f269084728f22f0a8a44606a1e7f32670071b2e8dcd44172db6ae6a48b08a835dd6bca25a357eaf59de480f2db4ef3ec13726bc3647325387bec96501bf555
-
Filesize
8KB
MD59cebcda545a470cdb23a53245d3c781b
SHA1de4557947d87b7ef80537704d26c706b0d0c8d2c
SHA256563704ac1abfd9e4f3d7648f07385d3b4acfe10cd5b972b81dc750a0fa9eea52
SHA512b720e6947cbfdf62f29f19a3ae1ac4247741ca8f98f8e587bea43b3663ab62f9949e84ab98c2e90349d6f9d8da1ab5d5646a22b12aebdeb389b1540a46628150
-
Filesize
150B
MD5d87c65ec559cd708389b6fbfcbddd52e
SHA1b2ce8a97c15d55bb8116bf1fcc94cf8fa69762df
SHA2567ef85e06b399ab65b9a8a16076b891d5e65b392bad8bdc32282967dc786fd3a1
SHA512149e08d58b191802ae97566eca10b559f53bbba58c6601bb41cf7caf6b945a35161162318e2b08fa9263ce77a7b4c7f4c9ab8205e44eedce7571368a81f51b48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-523280732-2327480845-3730041215-1000\83aa4cc77f591dfc2374580bbd95f6ba_a5c5e2ae-85e3-447c-9e0b-c9a7b966d823
Filesize45B
MD5c8366ae350e7019aefc9d1e6e6a498c6
SHA15731d8a3e6568a5f2dfbbc87e3db9637df280b61
SHA25611e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238
SHA51233c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd