Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe
-
Size
247KB
-
MD5
eea77f53df52609bddf7e7e3573d2c35
-
SHA1
1ef9c9fc398acb14fc81c1ead788873857dfb13d
-
SHA256
3d0a5e96a340e52b61359d6f68c441d18c726de97ee19a0ab60429c93a86ec79
-
SHA512
bf7a49888fbedae4fb321b531cf990558108ffc637c1186b76ac2f87461f92d3ce9d507b58b412c6954f543d0df8f994b69350b96e5f5c0f9883902107ea2602
-
SSDEEP
6144:TFBngH8Lfdx2mnKimeFZhr/2GfvQ3Pv9wuFv9R/YQ8VDec1/d2j:T3gcbz2mnKimexr/6zHyQ8Qc9Ej
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral1/memory/2104-6-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-10-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-9-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-8-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-5-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-4-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-2-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-12-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2104-11-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2408 set thread context of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 776 2104 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2104 2408 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 30 PID 2104 wrote to memory of 776 2104 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 31 PID 2104 wrote to memory of 776 2104 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 31 PID 2104 wrote to memory of 776 2104 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 31 PID 2104 wrote to memory of 776 2104 eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eea77f53df52609bddf7e7e3573d2c35_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 1403⤵
- Program crash
PID:776
-
-