Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe
-
Size
84KB
-
MD5
ad795a4a1d61f3461f3c56a5d20903cc
-
SHA1
1e76bc93c46c15960159abf9cebbc10c16b895f8
-
SHA256
e8e5292f99489bc64389d903609b7abf9867180ff89a7d5d0dfaac9cd863d189
-
SHA512
b1d7ea8aa7e013fd3b875acf65b087846c6c437481e8c55d41c697cc72228ec447b6d139df37082347d9473ecd1a055076d5afce584cbccf25f43d1ff433838a
-
SSDEEP
1536:fFHLKIX+YQGPoD5B4k91iv/KWJ8QCUwljFf+NDHi:fFrKIX65B4C1iv/KWJ8jtl+i
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3296 widrive32.exe 2856 widrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\widrive32.exe" ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4400 set thread context of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 3296 set thread context of 2856 3296 widrive32.exe 84 -
resource yara_rule behavioral2/memory/3100-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-7-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3100-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-20-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-21-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-24-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-26-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-27-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-28-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-29-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-32-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-34-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-35-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-36-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-37-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2856-38-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\widrive32.exe ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe File opened for modification C:\Windows\widrive32.exe ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe File created C:\Windows\%windir%\logfile32.log widrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language widrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 3296 widrive32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 4400 wrote to memory of 3100 4400 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 82 PID 3100 wrote to memory of 3296 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 83 PID 3100 wrote to memory of 3296 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 83 PID 3100 wrote to memory of 3296 3100 ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe 83 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84 PID 3296 wrote to memory of 2856 3296 widrive32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad795a4a1d61f3461f3c56a5d20903cc_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\widrive32.exe"C:\Windows\widrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5ad795a4a1d61f3461f3c56a5d20903cc
SHA11e76bc93c46c15960159abf9cebbc10c16b895f8
SHA256e8e5292f99489bc64389d903609b7abf9867180ff89a7d5d0dfaac9cd863d189
SHA512b1d7ea8aa7e013fd3b875acf65b087846c6c437481e8c55d41c697cc72228ec447b6d139df37082347d9473ecd1a055076d5afce584cbccf25f43d1ff433838a