Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 17:43

General

  • Target

    de973deed1361a058987f0d0d24c571e_JaffaCakes118.exe

  • Size

    67KB

  • MD5

    de973deed1361a058987f0d0d24c571e

  • SHA1

    0494c4b056432ec1cd7d27c5e284ab67f02c8594

  • SHA256

    444737fe64ba9cd2af155fc6fd85d16fea2df003b75149cf658777bd2a047325

  • SHA512

    9536762594e3c16a4063101f92666bb440dfce2aecc41a40de81f5907159ddddb53738a4e9676b67d8e8e96740436bc2bd5e0e8805792e4e693ccb753a6ffc3b

  • SSDEEP

    1536:b3TMb1FpPtYZdqgmkLbxtmMaf2vmibksnouy8UO:zeLpPtckUGf7idout

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.6:51348

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de973deed1361a058987f0d0d24c571e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de973deed1361a058987f0d0d24c571e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7F23.tmp\autorun.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\avg_free_stf_eu_10_12842.exe
        avg_free_stf_eu_10_12842.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7F23.tmp\autorun.bat

    Filesize

    86B

    MD5

    8ccf2d71872d7ab6c14eecc12dafcd76

    SHA1

    115414806701e27ae6a5c6ace0dfa69853c9944e

    SHA256

    6f875803af518e1b458cafd8da71520bc50b909a339d7e91ef9777736161fcef

    SHA512

    f4ef8d8bbafc0902288ac306c96c3d912cf16aa11bfc707d5da20abba4ed8d9215120adb3997b0d127f41ba2d5343926ce8dd7948965fa23aeefbb91e47ecc16

  • C:\Users\Admin\AppData\Local\Temp\avg_free_stf_eu_10_12842.exe

    Filesize

    72KB

    MD5

    38eb643b57f988865330e239e37bc62c

    SHA1

    7455cd46c8efd400fd0c81f4f2826dec3b96070b

    SHA256

    f998ffcd301c9109849b903007cf8fa92d303d710ecfbd925f87ac8f66cf6754

    SHA512

    0baa329c0c273e7c27165726f8b24aadc412bf4531de6386af2287c18696958e6d7c7a96357f2d3b3657f69b0299d6e12a5b7c2d2ca6ba60dcb8641a07294f9f

  • memory/2912-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2912-10-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4912-9-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB