Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe
-
Size
144KB
-
MD5
d9fd2afebd52b1aa86adbd91ec83a59b
-
SHA1
3c2377c1bfa267e8d497d2142c0421e2c3c99060
-
SHA256
a491bb7b55d07d3af972836cf798aa58a327dc7ebfcc7320b2d29586003bf7ea
-
SHA512
e7bc1f8f3311d712494ba2384db965ffb318bdfa61e696a695173d2fefcc78a8a3b70b231cf5c2fb6b93e3c4e1835cfacc464e12e77f7c6e623fd84cfb5af6af
-
SSDEEP
3072:/KWP0e0jwisqYWR6dLD9rbsx8zw1R/UYAx1iYW+:/53WFtYRdLDKxww1R/w1iYW+
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2428 aadrive32.exe 2068 aadrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2592 set thread context of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2428 set thread context of 2068 2428 aadrive32.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\aadrive32.exe d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe File opened for modification C:\Windows\aadrive32.exe d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log aadrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadrive32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 2428 aadrive32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2564 2592 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2428 2564 d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe 31 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32 PID 2428 wrote to memory of 2068 2428 aadrive32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d9fd2afebd52b1aa86adbd91ec83a59b_JaffaCakes118.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\aadrive32.exeC:\Windows\aadrive32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5d9fd2afebd52b1aa86adbd91ec83a59b
SHA13c2377c1bfa267e8d497d2142c0421e2c3c99060
SHA256a491bb7b55d07d3af972836cf798aa58a327dc7ebfcc7320b2d29586003bf7ea
SHA512e7bc1f8f3311d712494ba2384db965ffb318bdfa61e696a695173d2fefcc78a8a3b70b231cf5c2fb6b93e3c4e1835cfacc464e12e77f7c6e623fd84cfb5af6af