Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe
-
Size
260KB
-
MD5
a952fb59013a34434083c0d59df5c4cd
-
SHA1
585afd55d77dd4b54055e62dc167e034d6b83057
-
SHA256
b4a4d9d871bfb733b16c6c8ac61bc11e48a3df6c890cb8a2af719ceb8cbdb48d
-
SHA512
467f196933442c80eabeaa008a7acd9ac8e19009455e66b96a837ee12eacdc7c9021dc30a353e4126f9d4fb5b79663c7e18ccd84f38fb00df347ba6d8c356002
-
SSDEEP
3072:XXNtLGkl/985pk60kQi3Atem045GmwkkNet3gLCpp8dnPsasM:HLG4/9ECemr5GmHt
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 -
resource yara_rule behavioral1/memory/1316-2-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1316-8-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1316-11-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1316-10-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1316-6-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1316-4-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1316-13-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2260 1316 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 2404 wrote to memory of 1316 2404 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 28 PID 1316 wrote to memory of 2260 1316 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 29 PID 1316 wrote to memory of 2260 1316 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 29 PID 1316 wrote to memory of 2260 1316 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 29 PID 1316 wrote to memory of 2260 1316 a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a952fb59013a34434083c0d59df5c4cd_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 1403⤵
- Program crash
PID:2260
-
-