Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe
-
Size
244KB
-
MD5
ef08c4b337a4aee8adabbd4d9197566f
-
SHA1
d6739a74ec4c85de2170b2d57ffe61cf3fffc6b7
-
SHA256
52d6a3c4fa56f1262d9c72fff59d3ce05b0844fb6ec63da498af06f9f2f86654
-
SHA512
875206f79b7bcffbf55f03a439bf71dff8c1d4bfb0efa6d8a92745c5777867599a5fb1e444ac9c077b76f83aab0f9b42d53c2a1232904299c8956a420a1fe113
-
SSDEEP
3072:VQwmJiJeCWZvRDFgJV0YWh0KtbjJUMf3Ya0CzCRm:V8JkiY7K5ObQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\JavaTray = "C:\\Windows\\traymgr.exe" ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2088 traymgr.exe 2932 traymgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\Windows\\traymgr.exe" ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftCorp = "C:\\Windows\\traymgr.exe" ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2056 set thread context of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2088 set thread context of 2932 2088 traymgr.exe 31 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\traymgr.exe ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe File opened for modification C:\Windows\traymgr.exe ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language traymgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language traymgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 traymgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 2088 traymgr.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2732 2056 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 29 PID 2732 wrote to memory of 2088 2732 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2088 2732 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2088 2732 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2088 2732 ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2088 wrote to memory of 2932 2088 traymgr.exe 31 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20 PID 2932 wrote to memory of 1364 2932 traymgr.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef08c4b337a4aee8adabbd4d9197566f_JaffaCakes118.exe" c:\users\admin\appdata\local\temp\Program.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\traymgr.exe"C:\Windows\traymgr.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\traymgr.exe"C:\Windows\traymgr.exe" c:\users\admin\appdata\local\temp\Program.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5ef08c4b337a4aee8adabbd4d9197566f
SHA1d6739a74ec4c85de2170b2d57ffe61cf3fffc6b7
SHA25652d6a3c4fa56f1262d9c72fff59d3ce05b0844fb6ec63da498af06f9f2f86654
SHA512875206f79b7bcffbf55f03a439bf71dff8c1d4bfb0efa6d8a92745c5777867599a5fb1e444ac9c077b76f83aab0f9b42d53c2a1232904299c8956a420a1fe113