Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe
-
Size
89KB
-
MD5
acd8c340825fa8d129fa9d994ea5189a
-
SHA1
757fc05fd92627d1395c53b40d448ddcc1e62f7d
-
SHA256
e7532cb36d25191781832a57dff5423648080c9c7e8d431155a601c8e86fb703
-
SHA512
778294f645a147c64164353e543b1e761dc29f170bf9a4e397bcf1bdec6a90de43e2f0dc256b04c8920fb03e2ea5c0a02b2f84a1a74d32edbef53049d2ce5f52
-
SSDEEP
1536:zOpOWmH4UIbiV8EEhHX4VOykVf25lOjBXIINKhRGsqsQVS2Hwg:+OnH4UIbiV8EGHX/fUluB4INKn9kl
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 2 IoCs
pid Process 2740 AdobeARMS.exe 3752 AdobeARMS.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\patches = "1" acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "\\AdobeARMS.exe" AdobeARMS.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" AdobeARMS.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5048 set thread context of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 2740 set thread context of 3752 2740 AdobeARMS.exe 90 -
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-1-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-6-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-8-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-9-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-7-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2132-15-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-24-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-25-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-27-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-28-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-29-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-30-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/3752-31-0x0000000000400000-0x000000000048B000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 3228 5048 WerFault.exe 82 668 2740 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARMS.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 5048 wrote to memory of 2132 5048 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 86 PID 2132 wrote to memory of 2740 2132 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 87 PID 2132 wrote to memory of 2740 2132 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 87 PID 2132 wrote to memory of 2740 2132 acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe 87 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90 PID 2740 wrote to memory of 3752 2740 AdobeARMS.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 3762⤵
- Program crash
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exeC:\Users\Admin\AppData\Roaming\AdobeARMS.exe 908 "C:\Users\Admin\AppData\Local\Temp\acd8c340825fa8d129fa9d994ea5189a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 3764⤵
- Program crash
PID:668
-
-
C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3752
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5048 -ip 50481⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2740 -ip 27401⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5acd8c340825fa8d129fa9d994ea5189a
SHA1757fc05fd92627d1395c53b40d448ddcc1e62f7d
SHA256e7532cb36d25191781832a57dff5423648080c9c7e8d431155a601c8e86fb703
SHA512778294f645a147c64164353e543b1e761dc29f170bf9a4e397bcf1bdec6a90de43e2f0dc256b04c8920fb03e2ea5c0a02b2f84a1a74d32edbef53049d2ce5f52