Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe
-
Size
62KB
-
MD5
9a1c7c843c37b88717ee639df5164115
-
SHA1
50016c9c1a0827e5dac4918d8f979b78cc91df48
-
SHA256
0abe6844d2a514d040d7a7bccb8fe272042dc8229119f6860a7460f6bf29cbd8
-
SHA512
929b23489970058aa9cdf9c0a40c2ed723f572d8b2f9d04ff55d2cc505f69f08dc94b88cc87992253ca8be0e560d159e29ca8e0355b8d25e23483b1fb618037c
-
SSDEEP
1536:LnJdFerhX2T7sOyZsVhkMGnifkWhVMU7wwvm:LnJIhXyYOMsVmiNX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\mslsrv32.exe" 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1700 mslsrv32.exe 2580 mslsrv32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\mslsrv32.exe" 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2236 set thread context of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 1700 set thread context of 2580 1700 mslsrv32.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\mslsrv32.exe 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe File opened for modification C:\Windows\mslsrv32.exe 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe File created C:\Windows\logfile32.txt mslsrv32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mslsrv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mslsrv32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 2208 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2208 2236 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 30 PID 2208 wrote to memory of 1700 2208 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 31 PID 2208 wrote to memory of 1700 2208 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 31 PID 2208 wrote to memory of 1700 2208 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 31 PID 2208 wrote to memory of 1700 2208 9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe 31 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32 PID 1700 wrote to memory of 2580 1700 mslsrv32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a1c7c843c37b88717ee639df5164115_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\mslsrv32.exe"C:\Windows\mslsrv32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\mslsrv32.exe"C:\Windows\mslsrv32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD59a1c7c843c37b88717ee639df5164115
SHA150016c9c1a0827e5dac4918d8f979b78cc91df48
SHA2560abe6844d2a514d040d7a7bccb8fe272042dc8229119f6860a7460f6bf29cbd8
SHA512929b23489970058aa9cdf9c0a40c2ed723f572d8b2f9d04ff55d2cc505f69f08dc94b88cc87992253ca8be0e560d159e29ca8e0355b8d25e23483b1fb618037c