Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 01:11

General

  • Target

    f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    f4d9060f5539834826d39c1b2348857b

  • SHA1

    194c27d67b2cc9f0ab85c8715f91ceb26d0dd9b7

  • SHA256

    de1a56fa8f5b78c4e714bad8ed37490f411b93edda254561775f97446212288c

  • SHA512

    7ee793baa861dafec08d12a2971fa9e3915998a5c84d13b53c0736970a26633aff27f62b1facd0f59ac9242d985d4589656d39f956c3770214eebb1fc86b490f

  • SSDEEP

    768:rQ8eDDFt8MCGnobY3s+Aqhs/JGtpA4bOaxJZUD1RUAtGiyhyETN4oTgLElZ1C:rQ8YDFtUGoU35OGHA2q1WAUiYeoTZ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4d9060f5539834826d39c1b2348857b_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2440
  • C:\Windows\system\wmismgr.exe
    "C:\Windows\system\wmismgr.exe"
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\wmismgr.exe

    Filesize

    45KB

    MD5

    f4d9060f5539834826d39c1b2348857b

    SHA1

    194c27d67b2cc9f0ab85c8715f91ceb26d0dd9b7

    SHA256

    de1a56fa8f5b78c4e714bad8ed37490f411b93edda254561775f97446212288c

    SHA512

    7ee793baa861dafec08d12a2971fa9e3915998a5c84d13b53c0736970a26633aff27f62b1facd0f59ac9242d985d4589656d39f956c3770214eebb1fc86b490f

  • memory/2440-0-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2440-4-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2732-6-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB