Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe
-
Size
248KB
-
MD5
9d9205befd48b3d67ad2c6a1e8f40d06
-
SHA1
59f882f420f135baa305507f5baba312b6ff9983
-
SHA256
d6abecab9839ebab1336a822b23be4a846f50039844ad9e0657e408f01d0d326
-
SHA512
1c00c5079fd42f8916e747cd338c0b2c1720e6515c01b10e80c2758c3c8b3ac65fda06dfeef7b5363e8926829df66e7650e6af3f41412fffdc78f0bb06731a2b
-
SSDEEP
3072:wyKe64rz5/lzD8A6LmPdNJGhszlMN3Rz46RVO8Cc5LbKpo:wy56alPdNQWBMNNxVOwL
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2260 set thread context of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 -
resource yara_rule behavioral1/memory/524-8-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-5-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-12-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-11-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-10-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-9-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-4-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/524-3-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1708 524 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 2260 wrote to memory of 524 2260 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 31 PID 524 wrote to memory of 1708 524 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 32 PID 524 wrote to memory of 1708 524 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 32 PID 524 wrote to memory of 1708 524 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 32 PID 524 wrote to memory of 1708 524 9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d9205befd48b3d67ad2c6a1e8f40d06_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 1403⤵
- Program crash
PID:1708
-
-