Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe
-
Size
84KB
-
MD5
dcebfaf520933a514ef6e91147f028f8
-
SHA1
0efe99901cbfa89a576ae7aab294eb837a7e15c9
-
SHA256
75b621993635ffbd74e1f56f40f0eb37c24063ac53c31d5408840faedd1d9db7
-
SHA512
8c2845c1955459f13f851ca5125a38b33a97be7376079cabad2c79ff7a2f9918df728368070d87fc39652354205d7a0a7682c9adf7aa1d03781346611f75a0e2
-
SSDEEP
1536:BWy9QKp+VNJ1Px91aav/McKQCUwljFf+NDHj:BW8pAV1fv/McKjtl+j
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 372 widrive32.exe 2704 widrive32.exe -
resource yara_rule behavioral2/memory/3460-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3460-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3460-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3460-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-19-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3460-23-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-24-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-25-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-26-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-27-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-28-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-29-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-32-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-34-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-35-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-36-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-37-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2704-38-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3992 set thread context of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 372 set thread context of 2704 372 widrive32.exe 88 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\%windir%\logfile32.log widrive32.exe File created C:\Windows\widrive32.exe dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe File opened for modification C:\Windows\widrive32.exe dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 372 widrive32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3992 wrote to memory of 3460 3992 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 83 PID 3460 wrote to memory of 372 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 85 PID 3460 wrote to memory of 372 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 85 PID 3460 wrote to memory of 372 3460 dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe 85 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88 PID 372 wrote to memory of 2704 372 widrive32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcebfaf520933a514ef6e91147f028f8_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5dcebfaf520933a514ef6e91147f028f8
SHA10efe99901cbfa89a576ae7aab294eb837a7e15c9
SHA25675b621993635ffbd74e1f56f40f0eb37c24063ac53c31d5408840faedd1d9db7
SHA5128c2845c1955459f13f851ca5125a38b33a97be7376079cabad2c79ff7a2f9918df728368070d87fc39652354205d7a0a7682c9adf7aa1d03781346611f75a0e2