Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
-
Size
73KB
-
MD5
f263a1ad9bd2b07595f15e35ca17e5ac
-
SHA1
2b4543370b498a631095c4320330c58fd3129dcf
-
SHA256
1f4b237250617906b5123ccdc45c7d43b8032e6d4f8cd3319841d3b194f8ddb2
-
SHA512
0a89f0e3793bf944dcf3512706c0cc40b474a3ed11f507eefb18cbe3980588b1b5a9685cf8a8baf8a95a32c903425243b3ee88ea523daa1d497686cec9480a42
-
SSDEEP
1536:wPiVWnN2lvZYd1T6AQ3J4mbYkazDX68V1xu/bFoaICqArP:ET6Bf9abibFPICqAD
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 984 msconfig.exe -
Executes dropped EXE 2 IoCs
pid Process 4788 msconfig.exe 984 msconfig.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\msconfigsvrc = "C:\\Windows\\system\\msconfig.exe" f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msconfigsvrc = "C:\\Windows\\system\\msconfig.exe" f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1052 set thread context of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 4788 set thread context of 984 4788 msconfig.exe 85 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\msconfig.exe f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe File created C:\Windows\system\msconfig.exe f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 4788 msconfig.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 1052 wrote to memory of 4208 1052 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 83 PID 4208 wrote to memory of 4788 4208 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 84 PID 4208 wrote to memory of 4788 4208 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 84 PID 4208 wrote to memory of 4788 4208 f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe 84 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85 PID 4788 wrote to memory of 984 4788 msconfig.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system\msconfig.exe"C:\Windows\system\msconfig.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system\msconfig.exe
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5f263a1ad9bd2b07595f15e35ca17e5ac
SHA12b4543370b498a631095c4320330c58fd3129dcf
SHA2561f4b237250617906b5123ccdc45c7d43b8032e6d4f8cd3319841d3b194f8ddb2
SHA5120a89f0e3793bf944dcf3512706c0cc40b474a3ed11f507eefb18cbe3980588b1b5a9685cf8a8baf8a95a32c903425243b3ee88ea523daa1d497686cec9480a42