Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe
-
Size
92KB
-
MD5
dc35ba5ad019f27749e2be7ebaae59d9
-
SHA1
01b12273875660edaf26d56717305e31d52a3870
-
SHA256
dee584a7639cf59fe152467a2b7487555065f9bfc4b424bfd3e2e7264d9bc331
-
SHA512
0c0f3a5e58db1a3686700ce3f87f16d6e198600136a74faadd2486f25ce0b0486ccf6f5e76abdb6e6e8f956ff410469a7227133b4b7b69db0795d4db11c218d5
-
SSDEEP
1536:1eijpGXn9Ae8zSnZQAPZmg/mLRQCUwljFf+NDHR:QijpfSnZ16LRjtl+R
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 widrive32.exe 2300 widrive32.exe -
resource yara_rule behavioral1/memory/2752-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2752-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2752-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2752-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2752-18-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-25-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-26-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-28-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-29-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-32-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-34-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-35-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-36-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-37-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-38-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-39-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2300-40-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2700 set thread context of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 3028 set thread context of 2300 3028 widrive32.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\widrive32.exe dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe File opened for modification C:\Windows\widrive32.exe dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe File created C:\Windows\%windir%\logfile32.log widrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2752 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 2752 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 3028 widrive32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2700 wrote to memory of 2752 2700 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 30 PID 2752 wrote to memory of 3028 2752 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 31 PID 2752 wrote to memory of 3028 2752 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 31 PID 2752 wrote to memory of 3028 2752 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 31 PID 2752 wrote to memory of 3028 2752 dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe 31 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32 PID 3028 wrote to memory of 2300 3028 widrive32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc35ba5ad019f27749e2be7ebaae59d9_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5dc35ba5ad019f27749e2be7ebaae59d9
SHA101b12273875660edaf26d56717305e31d52a3870
SHA256dee584a7639cf59fe152467a2b7487555065f9bfc4b424bfd3e2e7264d9bc331
SHA5120c0f3a5e58db1a3686700ce3f87f16d6e198600136a74faadd2486f25ce0b0486ccf6f5e76abdb6e6e8f956ff410469a7227133b4b7b69db0795d4db11c218d5