Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe
-
Size
84KB
-
MD5
ad795a4a1d61f3461f3c56a5d20903cc
-
SHA1
1e76bc93c46c15960159abf9cebbc10c16b895f8
-
SHA256
e8e5292f99489bc64389d903609b7abf9867180ff89a7d5d0dfaac9cd863d189
-
SHA512
b1d7ea8aa7e013fd3b875acf65b087846c6c437481e8c55d41c697cc72228ec447b6d139df37082347d9473ecd1a055076d5afce584cbccf25f43d1ff433838a
-
SSDEEP
1536:fFHLKIX+YQGPoD5B4k91iv/KWJ8QCUwljFf+NDHi:fFrKIX65B4C1iv/KWJ8jtl+i
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2508 widrive32.exe 2068 widrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1940 set thread context of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 2508 set thread context of 2068 2508 widrive32.exe 32 -
resource yara_rule behavioral1/memory/2396-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2396-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2396-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2396-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2396-7-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-23-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-24-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-25-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-28-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-32-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-34-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-35-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-36-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-37-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-38-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-39-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-40-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-41-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2068-42-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\widrive32.exe ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe File opened for modification C:\Windows\widrive32.exe ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe File created C:\Windows\%windir%\logfile32.log widrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 2396 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 2508 widrive32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 1940 wrote to memory of 2396 1940 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2508 2396 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2508 2396 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2508 2396 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 31 PID 2396 wrote to memory of 2508 2396 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32 PID 2508 wrote to memory of 2068 2508 widrive32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5ad795a4a1d61f3461f3c56a5d20903cc
SHA11e76bc93c46c15960159abf9cebbc10c16b895f8
SHA256e8e5292f99489bc64389d903609b7abf9867180ff89a7d5d0dfaac9cd863d189
SHA512b1d7ea8aa7e013fd3b875acf65b087846c6c437481e8c55d41c697cc72228ec447b6d139df37082347d9473ecd1a055076d5afce584cbccf25f43d1ff433838a