Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe
-
Size
84KB
-
MD5
e9bd66c8df9cdcb8690146cd59c74f6c
-
SHA1
10cb2be5c94ede12115d7c2e2ee82c523185b00d
-
SHA256
49f2c1872bdc6bf4524f87016ee0e7f9a5b23e75dee49c2638c08c37236605c8
-
SHA512
878be14d2433e698073aba39e98546e397b0bc3278fb4335bdb6bb550ec839a5cac51a4efa59376c43d0fc4f48aa1b55630a9b27251258447e5bf2539f093774
-
SSDEEP
1536:u4EQphu7av/vZ91jv/97UyX5EQCUwljFf+NDHA:u6ruWv/71pwyX5Ejtl+A
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2448 widrive32.exe 3100 widrive32.exe -
resource yara_rule behavioral2/memory/1464-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1464-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1464-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1464-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1464-16-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-22-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-23-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-24-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-26-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-27-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-28-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-29-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-32-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-34-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-35-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-36-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-37-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-38-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2100 set thread context of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2448 set thread context of 3100 2448 widrive32.exe 84 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\%windir%\logfile32.log widrive32.exe File created C:\Windows\widrive32.exe e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe File opened for modification C:\Windows\widrive32.exe e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 2448 widrive32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 2100 wrote to memory of 1464 2100 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 82 PID 1464 wrote to memory of 2448 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 83 PID 1464 wrote to memory of 2448 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 83 PID 1464 wrote to memory of 2448 1464 e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe 83 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84 PID 2448 wrote to memory of 3100 2448 widrive32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9bd66c8df9cdcb8690146cd59c74f6c_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5e9bd66c8df9cdcb8690146cd59c74f6c
SHA110cb2be5c94ede12115d7c2e2ee82c523185b00d
SHA25649f2c1872bdc6bf4524f87016ee0e7f9a5b23e75dee49c2638c08c37236605c8
SHA512878be14d2433e698073aba39e98546e397b0bc3278fb4335bdb6bb550ec839a5cac51a4efa59376c43d0fc4f48aa1b55630a9b27251258447e5bf2539f093774