Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe
-
Size
254KB
-
MD5
a722e241530d41a570c50f98175ea7ad
-
SHA1
0c477e473a3e82bf6ca3a3d42074f239e3e395cd
-
SHA256
ea4a78226182e05ef4c1be2a9125f3fe37ccbf16c32359d73f4fff0c7e9e1e6f
-
SHA512
faef8e02e819df30851cb1789de2975d7505fea957d34ef6fe46699e48c0fddaeff8263bac3b62f6031394aff5ad4ec0eb81d8df6a5872cfd42d17496a327379
-
SSDEEP
3072:8ten3nHLUPHt2uYVxa2E65gQS4SCgagXas/WF3R/ul1r/EJUoQwXZ+5et+A:8438cQ2aSuSNuDr//BSZge
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxcb32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxcb32.exe = "C:\\Windows\\SysWOW64\\igfxcb32.exe:*:Enabled:Intel Data Backup" igfxcb32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxcb32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxcb32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxcb32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxcb32.exe = "C:\\Windows\\SysWOW64\\igfxcb32.exe:*:Enabled:Intel Data Backup" igfxcb32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxcb32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxcb32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1056 igfxcb32.exe -
Executes dropped EXE 2 IoCs
pid Process 1496 igfxcb32.exe 1056 igfxcb32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Data Backup = "C:\\Windows\\SysWOW64\\igfxcb32.exe" igfxcb32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcb32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxcb32.exe a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxcb32.exe a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxcb32.exe File opened for modification C:\Windows\SysWOW64\igfxcb32.exe igfxcb32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4808 set thread context of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 1496 set thread context of 1056 1496 igfxcb32.exe 98 -
resource yara_rule behavioral2/memory/2004-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2004-2-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2004-4-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2004-3-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2004-5-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2004-40-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1056-47-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1056-48-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1056-50-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1056-51-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1056-61-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcb32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe 1056 igfxcb32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 4808 wrote to memory of 2004 4808 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 83 PID 2004 wrote to memory of 1496 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 97 PID 2004 wrote to memory of 1496 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 97 PID 2004 wrote to memory of 1496 2004 a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe 97 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1496 wrote to memory of 1056 1496 igfxcb32.exe 98 PID 1056 wrote to memory of 3472 1056 igfxcb32.exe 56 PID 1056 wrote to memory of 3472 1056 igfxcb32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a722e241530d41a570c50f98175ea7ad_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\igfxcb32.exe"C:\Windows\SysWOW64\igfxcb32.exe" C:\Users\Admin\AppData\Local\Temp\A722E2~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\igfxcb32.exe"C:\Windows\SysWOW64\igfxcb32.exe" C:\Users\Admin\AppData\Local\Temp\A722E2~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5a722e241530d41a570c50f98175ea7ad
SHA10c477e473a3e82bf6ca3a3d42074f239e3e395cd
SHA256ea4a78226182e05ef4c1be2a9125f3fe37ccbf16c32359d73f4fff0c7e9e1e6f
SHA512faef8e02e819df30851cb1789de2975d7505fea957d34ef6fe46699e48c0fddaeff8263bac3b62f6031394aff5ad4ec0eb81d8df6a5872cfd42d17496a327379