Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
-
Size
73KB
-
MD5
f263a1ad9bd2b07595f15e35ca17e5ac
-
SHA1
2b4543370b498a631095c4320330c58fd3129dcf
-
SHA256
1f4b237250617906b5123ccdc45c7d43b8032e6d4f8cd3319841d3b194f8ddb2
-
SHA512
0a89f0e3793bf944dcf3512706c0cc40b474a3ed11f507eefb18cbe3980588b1b5a9685cf8a8baf8a95a32c903425243b3ee88ea523daa1d497686cec9480a42
-
SSDEEP
1536:wPiVWnN2lvZYd1T6AQ3J4mbYkazDX68V1xu/bFoaICqArP:ET6Bf9abibFPICqAD
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2892 msconfig.exe -
Executes dropped EXE 2 IoCs
pid Process 2436 msconfig.exe 2892 msconfig.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\msconfigsvrc = "C:\\Windows\\system\\msconfig.exe" f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
Loads dropped DLL 3 IoCs
pid Process 2012 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 2012 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 2436 msconfig.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msconfigsvrc = "C:\\Windows\\system\\msconfig.exe" f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 632 set thread context of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 2436 set thread context of 2892 2436 msconfig.exe 33 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\msconfig.exe f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe File opened for modification C:\Windows\system\msconfig.exe f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 2436 msconfig.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 632 wrote to memory of 2012 632 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 31 PID 2012 wrote to memory of 2436 2012 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 32 PID 2012 wrote to memory of 2436 2012 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 32 PID 2012 wrote to memory of 2436 2012 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 32 PID 2012 wrote to memory of 2436 2012 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 32 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33 PID 2436 wrote to memory of 2892 2436 msconfig.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system\msconfig.exe"C:\Windows\system\msconfig.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system\msconfig.exe
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5f263a1ad9bd2b07595f15e35ca17e5ac
SHA12b4543370b498a631095c4320330c58fd3129dcf
SHA2561f4b237250617906b5123ccdc45c7d43b8032e6d4f8cd3319841d3b194f8ddb2
SHA5120a89f0e3793bf944dcf3512706c0cc40b474a3ed11f507eefb18cbe3980588b1b5a9685cf8a8baf8a95a32c903425243b3ee88ea523daa1d497686cec9480a42