Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 02:09

General

  • Target

    f753e71596e634cd0e7b2a8c4a4de154_JaffaCakes118.exe

  • Size

    97KB

  • MD5

    f753e71596e634cd0e7b2a8c4a4de154

  • SHA1

    2bd42f05e910133a69a81bc789190a77b0010069

  • SHA256

    7b39735eab37ce2c500e6d5c875741995688ccdfe94fdcf020d8ecf28bf5e749

  • SHA512

    eace9d5c36316ae15333560c0dff5d12afde984665f19307ed20696f506226692520259a11740001703a9317519eda256829e1f0ff031aa408e227387a09f907

  • SSDEEP

    1536:rvbeN7i4ri12Lstf4LS/p4Yc8p/5C5wown6g6Syu7TYWZKMoF:rSlfScLw4Ns/4OaTugXF

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f753e71596e634cd0e7b2a8c4a4de154_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f753e71596e634cd0e7b2a8c4a4de154_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\YL.exe
      "C:\Users\Admin\AppData\Local\Temp\YL.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\x.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\SysWOW64\net.exe
          net stop "Security Center"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2936
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Security Center"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2592
      • C:\Windows\windows-krb.exe
        "C:\Windows\windows-krb.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\x.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\net.exe
            net stop "Security Center"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Security Center"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\YL.exe

    Filesize

    65KB

    MD5

    e93f56960b4d284089aabf9bef7ed909

    SHA1

    ccd8774ff3737324343a934fd758e0136ac815d6

    SHA256

    d4d67f3c5cda0beb05d266e8a7125edb3bc98c17e8cb794c42eb66613aba06ff

    SHA512

    d009fd8784973002222a971d7463393601db5fb7e115b45b815fefe4e88e1502ef7707a1bcc440e3afee11b937f60de781e5e8a1c9c4fd2d129e6386dffa5f10

  • C:\x.bat

    Filesize

    53B

    MD5

    e6ed7be2b9572503f07663ca6e53759f

    SHA1

    7ad80bd38f2a27e06c111b551c76ad0a0585c194

    SHA256

    b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9

    SHA512

    e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227

  • memory/2124-0-0x000007FEF5BDE000-0x000007FEF5BDF000-memory.dmp

    Filesize

    4KB

  • memory/2124-1-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2124-2-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2124-3-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2124-19-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

    Filesize

    9.6MB