Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe
-
Size
107KB
-
MD5
b1bdea08ffb92df68dd80b254f81a227
-
SHA1
05e40f239bd0a984f068a978c0cee4c6690ce702
-
SHA256
b192e3a5a3055a84aa5db7946930eae657269e233a429ac6709f4e4ec7b2137d
-
SHA512
ca7df27611626109a4a139030207a40717668957036ef9e055dfbe0102543b3765cdc7a8688d8a2d08ee9ff89476a878e7a0c2d01f6a3e8df6b6377923b018de
-
SSDEEP
3072:UAT0NpMhsLNDrbiAvofFQGQPyPeEbXYb9PfI:KNDrxofFzQaPeEbX49P
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wrdrive32.exe" b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1956 wrdrive32.exe 516 wrdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wrdrive32.exe" b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 216 set thread context of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 1956 set thread context of 516 1956 wrdrive32.exe 84 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wrdrive32.exe b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe File opened for modification C:\Windows\wrdrive32.exe b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log wrdrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrdrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 216 wrote to memory of 3644 216 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 82 PID 3644 wrote to memory of 1956 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1956 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1956 3644 b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe 83 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84 PID 1956 wrote to memory of 516 1956 wrdrive32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b1bdea08ffb92df68dd80b254f81a227_JaffaCakes118.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\wrdrive32.exe"C:\Windows\wrdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\wrdrive32.exeC:\Windows\wrdrive32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5b1bdea08ffb92df68dd80b254f81a227
SHA105e40f239bd0a984f068a978c0cee4c6690ce702
SHA256b192e3a5a3055a84aa5db7946930eae657269e233a429ac6709f4e4ec7b2137d
SHA512ca7df27611626109a4a139030207a40717668957036ef9e055dfbe0102543b3765cdc7a8688d8a2d08ee9ff89476a878e7a0c2d01f6a3e8df6b6377923b018de