Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe
-
Size
95KB
-
MD5
d9a86d5ecf83835d45174e9fb0a3bd5f
-
SHA1
ebca1be4feb150cac39059ff505a343bc24204ce
-
SHA256
c4b428c3aefff6101034705dac8a1c9efaf1479406ceec00d4161e6d6045db37
-
SHA512
d6bfd684f544f3943760b7541a3cbb99362f76c72c667c7f8d59d9eaede2cff75ace0a374387c2e9af5e0eb1c4bdc3065952a19843d092d6e72088929db0572e
-
SSDEEP
1536:IviqZoQNDW5SGOGqsqMPuQP4AYPdi6YUtFtFb3KuNTjniZeZnBLleI3SoTZx2781:IHosS5SsG5c4lVi6DFHDVNyZgVltDD2O
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 232 AdobeARM.exe 2092 AdobeARM.exe -
resource yara_rule behavioral2/memory/1384-0-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/1384-3-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/1384-4-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/1384-5-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/1384-13-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/2092-18-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/2092-21-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/2092-19-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/2092-22-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/2092-23-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/2092-24-0x0000000000400000-0x000000000048D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\patches = "1" d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARM = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARM.exe" d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeARM = "\\AdobeARM.exe" AdobeARM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARM = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARM.exe" AdobeARM.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1200 set thread context of 1384 1200 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 89 PID 232 set thread context of 2092 232 AdobeARM.exe 94 -
Program crash 2 IoCs
pid pid_target Process procid_target 100 1200 WerFault.exe 82 468 232 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARM.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1384 1200 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 89 PID 1200 wrote to memory of 1384 1200 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 89 PID 1200 wrote to memory of 1384 1200 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 89 PID 1200 wrote to memory of 1384 1200 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 89 PID 1200 wrote to memory of 1384 1200 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 89 PID 1384 wrote to memory of 232 1384 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 90 PID 1384 wrote to memory of 232 1384 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 90 PID 1384 wrote to memory of 232 1384 d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe 90 PID 232 wrote to memory of 2092 232 AdobeARM.exe 94 PID 232 wrote to memory of 2092 232 AdobeARM.exe 94 PID 232 wrote to memory of 2092 232 AdobeARM.exe 94 PID 232 wrote to memory of 2092 232 AdobeARM.exe 94 PID 232 wrote to memory of 2092 232 AdobeARM.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 2842⤵
- Program crash
PID:100
-
-
C:\Users\Admin\AppData\Local\Temp\d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Roaming\AdobeARM.exeC:\Users\Admin\AppData\Roaming\AdobeARM.exe 908 "C:\Users\Admin\AppData\Local\Temp\d9a86d5ecf83835d45174e9fb0a3bd5f_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 2804⤵
- Program crash
PID:468
-
-
C:\Users\Admin\AppData\Roaming\AdobeARM.exe"C:\Users\Admin\AppData\Roaming\AdobeARM.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1200 -ip 12001⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 232 -ip 2321⤵PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5d9a86d5ecf83835d45174e9fb0a3bd5f
SHA1ebca1be4feb150cac39059ff505a343bc24204ce
SHA256c4b428c3aefff6101034705dac8a1c9efaf1479406ceec00d4161e6d6045db37
SHA512d6bfd684f544f3943760b7541a3cbb99362f76c72c667c7f8d59d9eaede2cff75ace0a374387c2e9af5e0eb1c4bdc3065952a19843d092d6e72088929db0572e