Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe
-
Size
84KB
-
MD5
e9bd66c8df9cdcb8690146cd59c74f6c
-
SHA1
10cb2be5c94ede12115d7c2e2ee82c523185b00d
-
SHA256
49f2c1872bdc6bf4524f87016ee0e7f9a5b23e75dee49c2638c08c37236605c8
-
SHA512
878be14d2433e698073aba39e98546e397b0bc3278fb4335bdb6bb550ec839a5cac51a4efa59376c43d0fc4f48aa1b55630a9b27251258447e5bf2539f093774
-
SSDEEP
1536:u4EQphu7av/vZ91jv/97UyX5EQCUwljFf+NDHA:u6ruWv/71pwyX5Ejtl+A
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2036 widrive32.exe 2164 widrive32.exe -
resource yara_rule behavioral1/memory/2452-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2452-7-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2452-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2452-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-23-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-26-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-28-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-29-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-32-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-34-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-35-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-36-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-37-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-38-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-39-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2164-40-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1796 set thread context of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 2036 set thread context of 2164 2036 widrive32.exe 33 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\widrive32.exe e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe File opened for modification C:\Windows\widrive32.exe e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe File created C:\Windows\%windir%\logfile32.log widrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2452 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 2452 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 2036 widrive32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2452 1796 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2036 2452 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2036 2452 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2036 2452 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2036 2452 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 32 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33 PID 2036 wrote to memory of 2164 2036 widrive32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5e9bd66c8df9cdcb8690146cd59c74f6c
SHA110cb2be5c94ede12115d7c2e2ee82c523185b00d
SHA25649f2c1872bdc6bf4524f87016ee0e7f9a5b23e75dee49c2638c08c37236605c8
SHA512878be14d2433e698073aba39e98546e397b0bc3278fb4335bdb6bb550ec839a5cac51a4efa59376c43d0fc4f48aa1b55630a9b27251258447e5bf2539f093774