Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 10:45

General

  • Target

    ef9fa5d9dc48cd4f0c2e1166175970a8_JaffaCakes118.exe

  • Size

    459KB

  • MD5

    ef9fa5d9dc48cd4f0c2e1166175970a8

  • SHA1

    3bd3e47bbcba5e25e99ad5f16b59054ee6ba459c

  • SHA256

    6ac3ac762de5215b6877ab7c8c2ef412d1ee26dc214a3920fc77b9eb368c411c

  • SHA512

    6b61f88be6dd1aff246ce4e25c3d465aef940551e74d6a7bbb80ab326e08c2e675c2fb342830b61a0ed4bd550fb8769b68510c8f44edb3811603fe7dc1c4fcfd

  • SSDEEP

    6144:SWqA/eRwp0yN90QEq9Y5+yWFx5EcYkr+0ps0OApyiEkJJnJFg2JO0oNkJHCcttaU:7/eXy90I9Y5xCx+v0OPM9JuL0oNeCc

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.23:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef9fa5d9dc48cd4f0c2e1166175970a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ef9fa5d9dc48cd4f0c2e1166175970a8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FREEBO~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FREEBO~1.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FileSeek.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FileSeek.exe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FREEBO~1.EXE

    Filesize

    72KB

    MD5

    1f15563fa47f93479677a2763be77651

    SHA1

    5b9d483aaed8635f4e8cbdeb16008bbfec80dc66

    SHA256

    83a79201875a88a1ba3e980bd7e17692c78b9e9623e682d96edeb414f06f0694

    SHA512

    7a347991b3ccb1b11d3fb5ec78e2d648664a99ce7104f81070995281e8ac246d9c159db24d2fd9308298b9e4d73d7cf879fc2bc0ce6a505f533659706b727f47

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FileSeek.exe

    Filesize

    538KB

    MD5

    265f57140616e8d271af75f987a1ccf5

    SHA1

    871fecf7161a1527d6a465d2dbfbc0fc3e28f615

    SHA256

    d2d5944ca885678327eed5649c2ac833f6235797b748ce1d2c39cd3be70e1b68

    SHA512

    58c3b77caf443dc80f59046886aaf6cb3c4cca0c03c5d15935cb83d7aa3624b0f39806a37d3ad22b9bb7164dfc6eeb455182bae80fe0c41043ff058280d15d54

  • memory/1516-24-0x000000001C760000-0x000000001CC2E000-memory.dmp

    Filesize

    4.8MB

  • memory/1516-13-0x00007FFC0A295000-0x00007FFC0A296000-memory.dmp

    Filesize

    4KB

  • memory/1516-14-0x00007FFC09FE0000-0x00007FFC0A981000-memory.dmp

    Filesize

    9.6MB

  • memory/1516-15-0x00007FFC09FE0000-0x00007FFC0A981000-memory.dmp

    Filesize

    9.6MB

  • memory/1516-25-0x000000001BC10000-0x000000001BCAC000-memory.dmp

    Filesize

    624KB

  • memory/1516-26-0x000000001BCC0000-0x000000001BCC8000-memory.dmp

    Filesize

    32KB

  • memory/1516-27-0x0000000021780000-0x0000000021C8E000-memory.dmp

    Filesize

    5.1MB

  • memory/1516-28-0x00007FFC0A295000-0x00007FFC0A296000-memory.dmp

    Filesize

    4KB

  • memory/1516-29-0x00007FFC09FE0000-0x00007FFC0A981000-memory.dmp

    Filesize

    9.6MB

  • memory/1516-30-0x00007FFC09FE0000-0x00007FFC0A981000-memory.dmp

    Filesize

    9.6MB

  • memory/2864-9-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB