Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 00:38
Static task
static1
Behavioral task
behavioral1
Sample
e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe
-
Size
88KB
-
MD5
e5d9a0ae25a4267911f8a7bcf650597e
-
SHA1
f613ab292e797e2f246af2c0d18bb0420285983a
-
SHA256
9d3037b0d335e62d630b1e9696af9bbf56cfdc58b9245792daaf3a236a7c13e8
-
SHA512
8f11d30fc9e20446f02652a0ad24d3d46c1bfaf7afa0dbed716b1b4f25369c1bda81dd4daaa42b11f1ac7a284db04434f60d62ee853711919bd2ebcbcb340d87
-
SSDEEP
1536:9Mq8Qgj5JBhyd+O3R7CLosPiSui3ZCEqNTk97TscicRoZO24gavHE4KV19o9ms7A:G9y0O30CO0EaTk973RoZOnl/n+eV8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 1588 AdobeARMS.exe 3652 AdobeARMS.exe -
resource yara_rule behavioral2/memory/5008-1-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-7-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-6-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-9-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-5-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-0-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3652-23-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3652-27-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3652-22-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5008-30-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3652-31-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3652-32-0x0000000000400000-0x000000000048B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\patches = "1" e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "\\AdobeARMS.exe" AdobeARMS.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 640 set thread context of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 1588 set thread context of 3652 1588 AdobeARMS.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 904 640 WerFault.exe 81 532 1588 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARMS.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 640 wrote to memory of 5008 640 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 85 PID 5008 wrote to memory of 1588 5008 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 86 PID 5008 wrote to memory of 1588 5008 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 86 PID 5008 wrote to memory of 1588 5008 e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe 86 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89 PID 1588 wrote to memory of 3652 1588 AdobeARMS.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 3762⤵
- Program crash
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exeC:\Users\Admin\AppData\Roaming\AdobeARMS.exe 908 "C:\Users\Admin\AppData\Local\Temp\e5d9a0ae25a4267911f8a7bcf650597e_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 3764⤵
- Program crash
PID:532
-
-
C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 640 -ip 6401⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1588 -ip 15881⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e5d9a0ae25a4267911f8a7bcf650597e
SHA1f613ab292e797e2f246af2c0d18bb0420285983a
SHA2569d3037b0d335e62d630b1e9696af9bbf56cfdc58b9245792daaf3a236a7c13e8
SHA5128f11d30fc9e20446f02652a0ad24d3d46c1bfaf7afa0dbed716b1b4f25369c1bda81dd4daaa42b11f1ac7a284db04434f60d62ee853711919bd2ebcbcb340d87