Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe
-
Size
832KB
-
MD5
2b91151dba94878c27d1f4dd2755647e
-
SHA1
a5b87acc229831c6c9f14c0fdef297e14163c28f
-
SHA256
d214baeec15e71fac80762b4e0880ed3f4a9934a796c7df4e7dab45d91aa921f
-
SHA512
9e47a05da02cdcca626bf0f8348765b915c096d99f45f269135a1cccea27ea282968e8ca2a84c696e1e7b62ef6340aaa4e4de93673ba2875ea16e166ae94c94e
-
SSDEEP
12288:SZplgoiVg6B+SgougWhuX1xGHmz6Dma0eQ4ifunP1txKm8O1ZiZD91OutspJ3:SZ0tg6AifFxGGz6m4rVK5O1k91O
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2436 wmisynd.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 wmisynd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine 2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wmisynd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1720 2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe 2436 wmisynd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\wmisynd.exe 2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe File opened for modification C:\Windows\system\wmisynd.exe 2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisynd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 19 IoCs
Uses commandline utility to view network configuration.
pid Process 336 ipconfig.exe 2088 ipconfig.exe 2316 ipconfig.exe 1100 ipconfig.exe 2756 ipconfig.exe 112 ipconfig.exe 2168 ipconfig.exe 2020 ipconfig.exe 2560 ipconfig.exe 2696 ipconfig.exe 3020 ipconfig.exe 1948 ipconfig.exe 2584 ipconfig.exe 524 ipconfig.exe 1312 ipconfig.exe 2104 ipconfig.exe 860 ipconfig.exe 1580 ipconfig.exe 2272 ipconfig.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmisynd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wmisynd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wmisynd.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wmisynd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wmisynd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wmisynd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe 2436 wmisynd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2756 2436 wmisynd.exe 32 PID 2436 wrote to memory of 2756 2436 wmisynd.exe 32 PID 2436 wrote to memory of 2756 2436 wmisynd.exe 32 PID 2436 wrote to memory of 2756 2436 wmisynd.exe 32 PID 2436 wrote to memory of 2696 2436 wmisynd.exe 34 PID 2436 wrote to memory of 2696 2436 wmisynd.exe 34 PID 2436 wrote to memory of 2696 2436 wmisynd.exe 34 PID 2436 wrote to memory of 2696 2436 wmisynd.exe 34 PID 2436 wrote to memory of 3020 2436 wmisynd.exe 36 PID 2436 wrote to memory of 3020 2436 wmisynd.exe 36 PID 2436 wrote to memory of 3020 2436 wmisynd.exe 36 PID 2436 wrote to memory of 3020 2436 wmisynd.exe 36 PID 2436 wrote to memory of 112 2436 wmisynd.exe 38 PID 2436 wrote to memory of 112 2436 wmisynd.exe 38 PID 2436 wrote to memory of 112 2436 wmisynd.exe 38 PID 2436 wrote to memory of 112 2436 wmisynd.exe 38 PID 2436 wrote to memory of 524 2436 wmisynd.exe 40 PID 2436 wrote to memory of 524 2436 wmisynd.exe 40 PID 2436 wrote to memory of 524 2436 wmisynd.exe 40 PID 2436 wrote to memory of 524 2436 wmisynd.exe 40 PID 2436 wrote to memory of 1312 2436 wmisynd.exe 42 PID 2436 wrote to memory of 1312 2436 wmisynd.exe 42 PID 2436 wrote to memory of 1312 2436 wmisynd.exe 42 PID 2436 wrote to memory of 1312 2436 wmisynd.exe 42 PID 2436 wrote to memory of 2168 2436 wmisynd.exe 44 PID 2436 wrote to memory of 2168 2436 wmisynd.exe 44 PID 2436 wrote to memory of 2168 2436 wmisynd.exe 44 PID 2436 wrote to memory of 2168 2436 wmisynd.exe 44 PID 2436 wrote to memory of 860 2436 wmisynd.exe 46 PID 2436 wrote to memory of 860 2436 wmisynd.exe 46 PID 2436 wrote to memory of 860 2436 wmisynd.exe 46 PID 2436 wrote to memory of 860 2436 wmisynd.exe 46 PID 2436 wrote to memory of 336 2436 wmisynd.exe 48 PID 2436 wrote to memory of 336 2436 wmisynd.exe 48 PID 2436 wrote to memory of 336 2436 wmisynd.exe 48 PID 2436 wrote to memory of 336 2436 wmisynd.exe 48 PID 2436 wrote to memory of 1948 2436 wmisynd.exe 50 PID 2436 wrote to memory of 1948 2436 wmisynd.exe 50 PID 2436 wrote to memory of 1948 2436 wmisynd.exe 50 PID 2436 wrote to memory of 1948 2436 wmisynd.exe 50 PID 2436 wrote to memory of 2104 2436 wmisynd.exe 52 PID 2436 wrote to memory of 2104 2436 wmisynd.exe 52 PID 2436 wrote to memory of 2104 2436 wmisynd.exe 52 PID 2436 wrote to memory of 2104 2436 wmisynd.exe 52 PID 2436 wrote to memory of 2088 2436 wmisynd.exe 54 PID 2436 wrote to memory of 2088 2436 wmisynd.exe 54 PID 2436 wrote to memory of 2088 2436 wmisynd.exe 54 PID 2436 wrote to memory of 2088 2436 wmisynd.exe 54 PID 2436 wrote to memory of 2584 2436 wmisynd.exe 56 PID 2436 wrote to memory of 2584 2436 wmisynd.exe 56 PID 2436 wrote to memory of 2584 2436 wmisynd.exe 56 PID 2436 wrote to memory of 2584 2436 wmisynd.exe 56 PID 2436 wrote to memory of 2020 2436 wmisynd.exe 58 PID 2436 wrote to memory of 2020 2436 wmisynd.exe 58 PID 2436 wrote to memory of 2020 2436 wmisynd.exe 58 PID 2436 wrote to memory of 2020 2436 wmisynd.exe 58 PID 2436 wrote to memory of 2316 2436 wmisynd.exe 60 PID 2436 wrote to memory of 2316 2436 wmisynd.exe 60 PID 2436 wrote to memory of 2316 2436 wmisynd.exe 60 PID 2436 wrote to memory of 2316 2436 wmisynd.exe 60 PID 2436 wrote to memory of 1580 2436 wmisynd.exe 62 PID 2436 wrote to memory of 1580 2436 wmisynd.exe 62 PID 2436 wrote to memory of 1580 2436 wmisynd.exe 62 PID 2436 wrote to memory of 1580 2436 wmisynd.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b91151dba94878c27d1f4dd2755647e_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
C:\Windows\system\wmisynd.exe"C:\Windows\system\wmisynd.exe"1⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2756
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2696
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3020
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:112
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:524
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1312
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2168
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:860
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:336
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1948
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2104
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2088
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2584
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2020
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2316
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1580
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2272
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1100
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD52b91151dba94878c27d1f4dd2755647e
SHA1a5b87acc229831c6c9f14c0fdef297e14163c28f
SHA256d214baeec15e71fac80762b4e0880ed3f4a9934a796c7df4e7dab45d91aa921f
SHA5129e47a05da02cdcca626bf0f8348765b915c096d99f45f269135a1cccea27ea282968e8ca2a84c696e1e7b62ef6340aaa4e4de93673ba2875ea16e166ae94c94e