Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 01:11
Behavioral task
behavioral1
Sample
f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe
-
Size
45KB
-
MD5
f4d9060f5539834826d39c1b2348857b
-
SHA1
194c27d67b2cc9f0ab85c8715f91ceb26d0dd9b7
-
SHA256
de1a56fa8f5b78c4e714bad8ed37490f411b93edda254561775f97446212288c
-
SHA512
7ee793baa861dafec08d12a2971fa9e3915998a5c84d13b53c0736970a26633aff27f62b1facd0f59ac9242d985d4589656d39f956c3770214eebb1fc86b490f
-
SSDEEP
768:rQ8eDDFt8MCGnobY3s+Aqhs/JGtpA4bOaxJZUD1RUAtGiyhyETN4oTgLElZ1C:rQ8YDFtUGoU35OGHA2q1WAUiYeoTZ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2732 wmismgr.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 wmismgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wmismgr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\wmismgr.exe f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe File opened for modification C:\Windows\system\wmismgr.exe f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmismgr.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wmismgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wmismgr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmismgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wmismgr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wmismgr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmismgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2440
-
C:\Windows\system\wmismgr.exe"C:\Windows\system\wmismgr.exe"1⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5f4d9060f5539834826d39c1b2348857b
SHA1194c27d67b2cc9f0ab85c8715f91ceb26d0dd9b7
SHA256de1a56fa8f5b78c4e714bad8ed37490f411b93edda254561775f97446212288c
SHA5127ee793baa861dafec08d12a2971fa9e3915998a5c84d13b53c0736970a26633aff27f62b1facd0f59ac9242d985d4589656d39f956c3770214eebb1fc86b490f