Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe
-
Size
73KB
-
MD5
9c32c5bec9997eb182fd3a416d2c8e7b
-
SHA1
d88dca096c3cb4921f39375eb105cf3c58890b44
-
SHA256
d2d79138ff59a20c394732becf2e52eddbd22046a9effe2451b2baeb9a184408
-
SHA512
034c9db8a4075ec12d330178e3c5791345f10123ed12bf2341b4c4ab6769ec8988923df99fbe0c1ddfdc2602d88440fe78b1bb93caeb0c0ca8935b7869ace9e4
-
SSDEEP
1536:AKSaZ6KzsiT5piltFh1ZItEQXCAVTDgg0e4i9CYk1I6:fSc6KzVi71ZItgAng51mKI6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wjdrive32.exe" 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 212 wjdrive32.exe 4280 wjdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wjdrive32.exe" 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1868 set thread context of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 212 set thread context of 4280 212 wjdrive32.exe 87 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wjdrive32.exe 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe File opened for modification C:\Windows\wjdrive32.exe 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log wjdrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjdrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 1868 wrote to memory of 3516 1868 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 83 PID 3516 wrote to memory of 212 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 84 PID 3516 wrote to memory of 212 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 84 PID 3516 wrote to memory of 212 3516 9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe 84 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87 PID 212 wrote to memory of 4280 212 wjdrive32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9c32c5bec9997eb182fd3a416d2c8e7b_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\wjdrive32.exe"C:\Windows\wjdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\wjdrive32.exe"C:\Windows\wjdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD59c32c5bec9997eb182fd3a416d2c8e7b
SHA1d88dca096c3cb4921f39375eb105cf3c58890b44
SHA256d2d79138ff59a20c394732becf2e52eddbd22046a9effe2451b2baeb9a184408
SHA512034c9db8a4075ec12d330178e3c5791345f10123ed12bf2341b4c4ab6769ec8988923df99fbe0c1ddfdc2602d88440fe78b1bb93caeb0c0ca8935b7869ace9e4