Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 16:28

General

  • Target

    f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe

  • Size

    73KB

  • MD5

    f263a1ad9bd2b07595f15e35ca17e5ac

  • SHA1

    2b4543370b498a631095c4320330c58fd3129dcf

  • SHA256

    1f4b237250617906b5123ccdc45c7d43b8032e6d4f8cd3319841d3b194f8ddb2

  • SHA512

    0a89f0e3793bf944dcf3512706c0cc40b474a3ed11f507eefb18cbe3980588b1b5a9685cf8a8baf8a95a32c903425243b3ee88ea523daa1d497686cec9480a42

  • SSDEEP

    1536:wPiVWnN2lvZYd1T6AQ3J4mbYkazDX68V1xu/bFoaICqArP:ET6Bf9abibFPICqAD

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\f263a1ad9bd2b07595f15e35ca17e5ac_JaffaCakes118.exe
      2⤵
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Windows\system\msconfig.exe
        "C:\Windows\system\msconfig.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Windows\system\msconfig.exe
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System\msconfig.exe

    Filesize

    73KB

    MD5

    f263a1ad9bd2b07595f15e35ca17e5ac

    SHA1

    2b4543370b498a631095c4320330c58fd3129dcf

    SHA256

    1f4b237250617906b5123ccdc45c7d43b8032e6d4f8cd3319841d3b194f8ddb2

    SHA512

    0a89f0e3793bf944dcf3512706c0cc40b474a3ed11f507eefb18cbe3980588b1b5a9685cf8a8baf8a95a32c903425243b3ee88ea523daa1d497686cec9480a42

  • memory/984-24-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-28-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-23-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-17-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-18-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-33-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-21-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-25-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-34-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-32-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-22-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-26-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-27-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-31-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-29-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/984-30-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/4208-5-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/4208-2-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/4208-19-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/4208-4-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB