Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 22:49

General

  • Target

    b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    b3e63de0ee2812b92c280e2ae78808cd

  • SHA1

    0cc3966cd4a307f84b6a69c1aa59998e1fafd66d

  • SHA256

    e2fe63ffbe9f45034849ecb306e5399eb70a219758e421b3dc368be9aa4da307

  • SHA512

    f9a871880ebaa7c89fd9e6418310bf6876ffee12ec7a9974c0132a27cf55f452a3d4caf4cfc3ee12bb52e204895c256d140ee28d00ed3d2f258af9563b6fb646

  • SSDEEP

    1536:r7Xl6xlLXtJbru/+nxylEu4y44aj9QQCVWnfr0525p:r7XlkJXHK/+nxjy4dxCqVn

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • Disables service(s) 3 TTPs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 27 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe"
        2⤵
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
          3⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Checks computer location settings
          • Impair Defenses: Safe Mode Boot
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\SysWOW64\wmisrpd.exe
            "C:\Windows\system32\wmisrpd.exe"
            4⤵
            • Executes dropped EXE
            • Maps connected drives based on registry
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Windows\SysWOW64\wmisrpd.exe
              C:\Windows\SysWOW64\wmisrpd.exe
              5⤵
              • Modifies firewall policy service
              • Modifies security service
              • Windows security bypass
              • Drops file in Drivers directory
              • Event Triggered Execution: Image File Execution Options Injection
              • Executes dropped EXE
              • Impair Defenses: Safe Mode Boot
              • Windows security modification
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:4132
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C net stop "avast! Antivirus"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4212
                • C:\Windows\SysWOW64\net.exe
                  net stop "avast! Antivirus"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2120
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "avast! Antivirus"
                    8⤵
                      PID:4656
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc stop "avast! Antivirus"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2356
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop "avast! Antivirus"
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:4492
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc config "avast! Antivirus" start= disabled
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2888
                  • C:\Windows\SysWOW64\sc.exe
                    sc config "avast! Antivirus" start= disabled
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:4764
                • C:\Windows\SysWOW64\ipconfig.exe
                  ipconfig /flushdns
                  6⤵
                  • Gathers network information
                  PID:488
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc delete "avast! Antivirus"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1148
                  • C:\Windows\SysWOW64\sc.exe
                    sc delete "avast! Antivirus"
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:4704
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C net stop AntiVirService
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:4836
                  • C:\Windows\SysWOW64\net.exe
                    net stop AntiVirService
                    7⤵
                      PID:3916
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop AntiVirService
                        8⤵
                          PID:836
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc stop AntiVirService
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2912
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop AntiVirService
                        7⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:428
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc config AntiVirService start= disabled
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4284
                      • C:\Windows\SysWOW64\sc.exe
                        sc config AntiVirService start= disabled
                        7⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3572
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc delete AntiVirService
                      6⤵
                        PID:1696
                        • C:\Windows\SysWOW64\sc.exe
                          sc delete AntiVirService
                          7⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:4884
                      • C:\Windows\SysWOW64\CMD.exe
                        CMD /C net stop PASRV
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:2072
                        • C:\Windows\SysWOW64\net.exe
                          net stop PASRV
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:3856
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop PASRV
                            8⤵
                              PID:4796
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C sc stop PASRV
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2880
                          • C:\Windows\SysWOW64\sc.exe
                            sc stop PASRV
                            7⤵
                            • Launches sc.exe
                            PID:2412
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C sc config PASRV start= disabled
                          6⤵
                            PID:3140
                            • C:\Windows\SysWOW64\sc.exe
                              sc config PASRV start= disabled
                              7⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4192
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C sc delete PASRV
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:3488
                            • C:\Windows\SysWOW64\sc.exe
                              sc delete PASRV
                              7⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4388
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C net stop VSSERV
                            6⤵
                              PID:4408
                              • C:\Windows\SysWOW64\net.exe
                                net stop VSSERV
                                7⤵
                                • System Location Discovery: System Language Discovery
                                PID:3544
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop VSSERV
                                  8⤵
                                    PID:1920
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc stop VSSERV
                                6⤵
                                  PID:4324
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc stop VSSERV
                                    7⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:1668
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C sc config VSSERV start= disabled
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4920
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config VSSERV start= disabled
                                    7⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:4676
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C sc delete VSSERV
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2804
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc delete VSSERV
                                    7⤵
                                    • Launches sc.exe
                                    PID:2952
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C net stop avg8wd
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1784
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop avg8wd
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3952
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop avg8wd
                                      8⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1016
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C sc stop avg8wd
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:740
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc stop avg8wd
                                    7⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:4584
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C sc config avg8wd start= disabled
                                  6⤵
                                    PID:2728
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc config avg8wd start= disabled
                                      7⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:812
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C sc delete avg8wd
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:972
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc delete avg8wd
                                      7⤵
                                      • Launches sc.exe
                                      PID:4788
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C net stop NOD32krn
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4820
                                    • C:\Windows\SysWOW64\net.exe
                                      net stop NOD32krn
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3548
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop NOD32krn
                                        8⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4180
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C sc stop NOD32krn
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1692
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc stop NOD32krn
                                      7⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:488
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C sc config NOD32krn start= disabled
                                    6⤵
                                      PID:2908
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config NOD32krn start= disabled
                                        7⤵
                                        • Launches sc.exe
                                        PID:4212
                                    • C:\Windows\SysWOW64\CMD.exe
                                      CMD /C sc delete NOD32krn
                                      6⤵
                                        PID:1152
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc delete NOD32krn
                                          7⤵
                                          • Launches sc.exe
                                          PID:4572
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C net stop SbPF.Launcher
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2244
                                        • C:\Windows\SysWOW64\net.exe
                                          net stop SbPF.Launcher
                                          7⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2460
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 stop SbPF.Launcher
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2912
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C sc stop SbPF.Launcher
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3524
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc stop SbPF.Launcher
                                          7⤵
                                          • Launches sc.exe
                                          PID:4244
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C sc config SbPF.Launcher start= disabled
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5020
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc config SbPF.Launcher start= disabled
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:4284
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C sc delete SbPF.Launcher
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3460
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc delete SbPF.Launcher
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:4836
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C net stop SPF4
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5068
                                        • C:\Windows\SysWOW64\net.exe
                                          net stop SPF4
                                          7⤵
                                            PID:1616
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 stop SPF4
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1196
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C sc stop SPF4
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1380
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc stop SPF4
                                            7⤵
                                            • Launches sc.exe
                                            • System Location Discovery: System Language Discovery
                                            PID:2540
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C sc config SPF4 start= disabled
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2124
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc config SPF4 start= disabled
                                            7⤵
                                            • Launches sc.exe
                                            • System Location Discovery: System Language Discovery
                                            PID:3612
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C sc delete SPF4
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1164
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc delete SPF4
                                            7⤵
                                            • Launches sc.exe
                                            PID:2072
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C net stop acssrv
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2360
                                          • C:\Windows\SysWOW64\net.exe
                                            net stop acssrv
                                            7⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1668
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 stop acssrv
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1468
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C sc stop acssrv
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:64
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc stop acssrv
                                            7⤵
                                            • Launches sc.exe
                                            • System Location Discovery: System Language Discovery
                                            PID:444
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C sc config acssrv start= disabled
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1604
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc config acssrv start= disabled
                                            7⤵
                                            • Launches sc.exe
                                            • System Location Discovery: System Language Discovery
                                            PID:264
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C sc delete acssrv
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2148
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc delete acssrv
                                            7⤵
                                            • Launches sc.exe
                                            • System Location Discovery: System Language Discovery
                                            PID:3848
                                        • C:\Windows\SysWOW64\ipconfig.exe
                                          ipconfig /flushdns
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Gathers network information
                                          PID:2920
                                        • C:\Windows\SysWOW64\ipconfig.exe
                                          ipconfig /flushdns
                                          6⤵
                                          • Gathers network information
                                          PID:4284
                                    • C:\Windows\SysWOW64\CMD.exe
                                      CMD /C del /F /S /Q *.zip
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4652
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B3E63D~1.EXE > nul
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1160

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\SysWOW64\wmisrpd.exe

                                Filesize

                                81KB

                                MD5

                                b3e63de0ee2812b92c280e2ae78808cd

                                SHA1

                                0cc3966cd4a307f84b6a69c1aa59998e1fafd66d

                                SHA256

                                e2fe63ffbe9f45034849ecb306e5399eb70a219758e421b3dc368be9aa4da307

                                SHA512

                                f9a871880ebaa7c89fd9e6418310bf6876ffee12ec7a9974c0132a27cf55f452a3d4caf4cfc3ee12bb52e204895c256d140ee28d00ed3d2f258af9563b6fb646

                              • C:\Windows\System32\drivers\etc\hosts

                                Filesize

                                15KB

                                MD5

                                96d179abc939ae4cc8f6d61cb8b6fe6d

                                SHA1

                                004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a

                                SHA256

                                aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194

                                SHA512

                                434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719

                              • memory/2232-0-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2232-2-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2232-3-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2232-10-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/4132-14-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/4132-15-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/4132-16-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB