Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe
-
Size
538KB
-
MD5
f1c843be0c0b8bd3a45bd085292a35f4
-
SHA1
0c3008c7693f3dc8c0147ec91868f4955ca2705e
-
SHA256
3b6a10706c67feb2ed16ccf8ef30987ba451a7674a6ab0cd8bfb569bcc89f135
-
SHA512
575bbf300fdb23aa967c454488419ef1ce12605a9a74baa36a84368e93983aec228d200b5ff7cfa06a6e0c78582b4f2d70d5578227c1975a707a811c4b16cedc
-
SSDEEP
12288:lA3bXIZrTpuJZJ+Ns1pBGqZ/Uz1NIn6JqgOVn:lkXknpu/+sDZlUSb
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\sysdrv32.sys wmisbus.exe -
Deletes itself 1 IoCs
pid Process 2992 wmisbus.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 wmisbus.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wmisbus.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2396 f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe 2992 wmisbus.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\wmisbus.exe f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe File opened for modification C:\Windows\system\wmisbus.exe f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisbus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 21 IoCs
Uses commandline utility to view network configuration.
pid Process 1280 ipconfig.exe 1952 ipconfig.exe 1572 ipconfig.exe 2428 ipconfig.exe 444 ipconfig.exe 2268 ipconfig.exe 376 ipconfig.exe 1516 ipconfig.exe 2728 ipconfig.exe 2368 ipconfig.exe 1192 ipconfig.exe 2012 ipconfig.exe 1944 ipconfig.exe 2408 ipconfig.exe 2148 ipconfig.exe 2536 ipconfig.exe 1552 ipconfig.exe 1644 ipconfig.exe 1344 ipconfig.exe 2288 ipconfig.exe 2868 ipconfig.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wmisbus.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wmisbus.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmisbus.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wmisbus.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wmisbus.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmisbus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe 2992 wmisbus.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2992 wmisbus.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1280 2992 wmisbus.exe 32 PID 2992 wrote to memory of 1280 2992 wmisbus.exe 32 PID 2992 wrote to memory of 1280 2992 wmisbus.exe 32 PID 2992 wrote to memory of 1280 2992 wmisbus.exe 32 PID 2992 wrote to memory of 1192 2992 wmisbus.exe 34 PID 2992 wrote to memory of 1192 2992 wmisbus.exe 34 PID 2992 wrote to memory of 1192 2992 wmisbus.exe 34 PID 2992 wrote to memory of 1192 2992 wmisbus.exe 34 PID 2992 wrote to memory of 2012 2992 wmisbus.exe 36 PID 2992 wrote to memory of 2012 2992 wmisbus.exe 36 PID 2992 wrote to memory of 2012 2992 wmisbus.exe 36 PID 2992 wrote to memory of 2012 2992 wmisbus.exe 36 PID 2992 wrote to memory of 1944 2992 wmisbus.exe 38 PID 2992 wrote to memory of 1944 2992 wmisbus.exe 38 PID 2992 wrote to memory of 1944 2992 wmisbus.exe 38 PID 2992 wrote to memory of 1944 2992 wmisbus.exe 38 PID 2992 wrote to memory of 2408 2992 wmisbus.exe 40 PID 2992 wrote to memory of 2408 2992 wmisbus.exe 40 PID 2992 wrote to memory of 2408 2992 wmisbus.exe 40 PID 2992 wrote to memory of 2408 2992 wmisbus.exe 40 PID 2992 wrote to memory of 2148 2992 wmisbus.exe 42 PID 2992 wrote to memory of 2148 2992 wmisbus.exe 42 PID 2992 wrote to memory of 2148 2992 wmisbus.exe 42 PID 2992 wrote to memory of 2148 2992 wmisbus.exe 42 PID 2992 wrote to memory of 444 2992 wmisbus.exe 44 PID 2992 wrote to memory of 444 2992 wmisbus.exe 44 PID 2992 wrote to memory of 444 2992 wmisbus.exe 44 PID 2992 wrote to memory of 444 2992 wmisbus.exe 44 PID 2992 wrote to memory of 2268 2992 wmisbus.exe 46 PID 2992 wrote to memory of 2268 2992 wmisbus.exe 46 PID 2992 wrote to memory of 2268 2992 wmisbus.exe 46 PID 2992 wrote to memory of 2268 2992 wmisbus.exe 46 PID 2992 wrote to memory of 2536 2992 wmisbus.exe 48 PID 2992 wrote to memory of 2536 2992 wmisbus.exe 48 PID 2992 wrote to memory of 2536 2992 wmisbus.exe 48 PID 2992 wrote to memory of 2536 2992 wmisbus.exe 48 PID 2992 wrote to memory of 376 2992 wmisbus.exe 50 PID 2992 wrote to memory of 376 2992 wmisbus.exe 50 PID 2992 wrote to memory of 376 2992 wmisbus.exe 50 PID 2992 wrote to memory of 376 2992 wmisbus.exe 50 PID 2992 wrote to memory of 1552 2992 wmisbus.exe 52 PID 2992 wrote to memory of 1552 2992 wmisbus.exe 52 PID 2992 wrote to memory of 1552 2992 wmisbus.exe 52 PID 2992 wrote to memory of 1552 2992 wmisbus.exe 52 PID 2992 wrote to memory of 1952 2992 wmisbus.exe 54 PID 2992 wrote to memory of 1952 2992 wmisbus.exe 54 PID 2992 wrote to memory of 1952 2992 wmisbus.exe 54 PID 2992 wrote to memory of 1952 2992 wmisbus.exe 54 PID 2992 wrote to memory of 1516 2992 wmisbus.exe 57 PID 2992 wrote to memory of 1516 2992 wmisbus.exe 57 PID 2992 wrote to memory of 1516 2992 wmisbus.exe 57 PID 2992 wrote to memory of 1516 2992 wmisbus.exe 57 PID 2992 wrote to memory of 1644 2992 wmisbus.exe 59 PID 2992 wrote to memory of 1644 2992 wmisbus.exe 59 PID 2992 wrote to memory of 1644 2992 wmisbus.exe 59 PID 2992 wrote to memory of 1644 2992 wmisbus.exe 59 PID 2992 wrote to memory of 1572 2992 wmisbus.exe 61 PID 2992 wrote to memory of 1572 2992 wmisbus.exe 61 PID 2992 wrote to memory of 1572 2992 wmisbus.exe 61 PID 2992 wrote to memory of 1572 2992 wmisbus.exe 61 PID 2992 wrote to memory of 2728 2992 wmisbus.exe 63 PID 2992 wrote to memory of 2728 2992 wmisbus.exe 63 PID 2992 wrote to memory of 2728 2992 wmisbus.exe 63 PID 2992 wrote to memory of 2728 2992 wmisbus.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1c843be0c0b8bd3a45bd085292a35f4_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
C:\Windows\system\wmisbus.exe"C:\Windows\system\wmisbus.exe"1⤵
- Drops file in Drivers directory
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1280
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1192
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2012
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1944
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2408
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2148
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:444
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2268
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2536
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:376
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1552
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1952
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1516
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1644
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1572
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2728
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2868
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2368
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1344
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2428
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD5f1c843be0c0b8bd3a45bd085292a35f4
SHA10c3008c7693f3dc8c0147ec91868f4955ca2705e
SHA2563b6a10706c67feb2ed16ccf8ef30987ba451a7674a6ab0cd8bfb569bcc89f135
SHA512575bbf300fdb23aa967c454488419ef1ce12605a9a74baa36a84368e93983aec228d200b5ff7cfa06a6e0c78582b4f2d70d5578227c1975a707a811c4b16cedc