Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe
-
Size
89KB
-
MD5
acd8c340825fa8d129fa9d994ea5189a
-
SHA1
757fc05fd92627d1395c53b40d448ddcc1e62f7d
-
SHA256
e7532cb36d25191781832a57dff5423648080c9c7e8d431155a601c8e86fb703
-
SHA512
778294f645a147c64164353e543b1e761dc29f170bf9a4e397bcf1bdec6a90de43e2f0dc256b04c8920fb03e2ea5c0a02b2f84a1a74d32edbef53049d2ce5f52
-
SSDEEP
1536:zOpOWmH4UIbiV8EEhHX4VOykVf25lOjBXIINKhRGsqsQVS2Hwg:+OnH4UIbiV8EGHX/fUluB4INKn9kl
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 2 IoCs
pid Process 2916 AdobeARMS.exe 2804 AdobeARMS.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 1228 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\patches = "1" acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "\\AdobeARMS.exe" AdobeARMS.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2268 set thread context of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2916 set thread context of 2804 2916 AdobeARMS.exe 32 -
resource yara_rule behavioral1/memory/1228-17-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-14-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-13-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-12-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-9-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-3-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1228-26-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2804-44-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2804-43-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2804-41-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2804-40-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2804-42-0x0000000000400000-0x000000000048B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARMS.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 2268 wrote to memory of 1228 2268 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 30 PID 1228 wrote to memory of 2916 1228 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 31 PID 1228 wrote to memory of 2916 1228 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 31 PID 1228 wrote to memory of 2916 1228 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 31 PID 1228 wrote to memory of 2916 1228 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32 PID 2916 wrote to memory of 2804 2916 AdobeARMS.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exeC:\Users\Admin\AppData\Roaming\AdobeARMS.exe 388 "C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5acd8c340825fa8d129fa9d994ea5189a
SHA1757fc05fd92627d1395c53b40d448ddcc1e62f7d
SHA256e7532cb36d25191781832a57dff5423648080c9c7e8d431155a601c8e86fb703
SHA512778294f645a147c64164353e543b1e761dc29f170bf9a4e397bcf1bdec6a90de43e2f0dc256b04c8920fb03e2ea5c0a02b2f84a1a74d32edbef53049d2ce5f52